CVE-2024-39698

electron-updater allows for automatic updates for Electron apps. The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). The patch is available starting from 6.3.0-alpha.6.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:electron:electron-builder:*:*:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha0:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:electron:electron-builder:6.3.0:alpha5:*:*:*:node.js:*:*

History

No history.

Information

Published : 2024-07-09 18:15

Updated : 2024-07-12 17:06


NVD link : CVE-2024-39698

Mitre link : CVE-2024-39698

CVE.ORG link : CVE-2024-39698


JSON object : View

Products Affected

electron

  • electron-builder
CWE
CWE-295

Improper Certificate Validation

CWE-154

Improper Neutralization of Variable Name Delimiters