Guest User

Terminal Command to Check for Sparkle Vulnerability in OS X

a guest
Feb 15th, 2016
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. for app in /Applications/*/Contents/Frameworks/Sparkle.framework; do plist=${app/Frameworks\/Sparkle.framework/Info.plist}; url=`defaults read "$plist" SUFeedURL 2>/dev/null`; if [[ $url != "https"* ]]; then echo ${app/.app*/} " and plist=$plist"; fi; done
RAW Paste Data