CVE-2022-29257 – electron
Package
Manager: npm
Name: electron
Vulnerable Version: >=0 <15.5.0 || >=16.0.0-beta1 <=16.0.0-beta9 || >=16.0.1 <16.2.0 || >=17.0.0-beta1 <=17.0.0-beta9 || >=17.0.1 <17.2.0 || >=18.0.0-beta1 <=18.0.0-beta5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00413 pctl0.60707
Details
AutoUpdater module fails to validate certain nested components of the bundle ### Impact This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. Please note that this kind of attack would require **significant** privileges in your own auto updating infrastructure and the ease of that attack entirely depends on your infrastructure security. ### Patches This has been patched and the following Electron versions contain the fix: * `18.0.0-beta.6` * `17.2.0` * `16.2.0` * `15.5.0` ### Workarounds There are no workarounds for this issue, please update to a patched version of Electron. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
Metadata
Created: 2022-06-16T23:18:47Z
Modified: 2022-06-29T21:48:38Z
Source: MANUAL
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-77xc-hjv8-ww97
Finding: F184
Auto approve: 1