logo

CVE-2022-29257 electron

Package

Manager: npm
Name: electron
Vulnerable Version: >=0 <15.5.0 || >=16.0.0-beta1 <=16.0.0-beta9 || >=16.0.1 <16.2.0 || >=17.0.0-beta1 <=17.0.0-beta9 || >=17.0.1 <17.2.0 || >=18.0.0-beta1 <=18.0.0-beta5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00413 pctl0.60707

Details

AutoUpdater module fails to validate certain nested components of the bundle ### Impact This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. Please note that this kind of attack would require **significant** privileges in your own auto updating infrastructure and the ease of that attack entirely depends on your infrastructure security. ### Patches This has been patched and the following Electron versions contain the fix: * `18.0.0-beta.6` * `17.2.0` * `16.2.0` * `15.5.0` ### Workarounds There are no workarounds for this issue, please update to a patched version of Electron. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)

Metadata

Created: 2022-06-16T23:18:47Z
Modified: 2022-06-29T21:48:38Z
Source: MANUAL
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-77xc-hjv8-ww97
Finding: F184
Auto approve: 1