Lack of data validation In electerm
Description
Electerm users can run dangrous code through link or command line
Impact
Arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Affected users: electerm installs that accept protocol URLs or CLI options (affected versions listed in the original report). Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts.
Patches
Fixed in version > 3.8.8
Commits:
https://github.com/electerm/electerm/commit/8a6a17951e96d715f5a231532bbd8303fe208700
https://github.com/electerm/electerm/commit/a79e06f4a1f0ac6376c3d2411ef4690fa0377742
Workarounds
Disable or unregister electerm protocol handlers (Deep Link settings) and avoid clicking electerm:// links.
Do not run electerm with untrusted --opts arguments or open .lnk / .desktop files from untrusted sources.
Restrict which users can launch electerm on shared machines and avoid leaving electerm installed in locations reachable by other users.
As a temporary measure, run electerm in a confined account or sandbox (non-admin user) to reduce impact.
Resources
Report / credit: https://github.com/Curly-Haired-Baboon
Electerm releases: https://github.com/electerm/electerm/releases
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
npm | electerm | 3.8.15 |
Aliases
References