Skip to content

Find Electron Apps Vulnerable to CVE-2023-4863 / CVE-2023-5129

License

Notifications You must be signed in to change notification settings

GTGalaxi/ElectronVulnerableVersion

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Find Electron Apps Vulnerable to CVE-2023-4863 / CVE-2023-5129

This PowerShell script downloads Sysinternals Strings, recursively searches for strings within all .exe files across all drives, and compares the Electron version found with known patched versions below to determine vulnerability to CVE-2023-4863 / CVE-2023-5129.

Note:

The script downloads strings.zip to C:\Windows\Temp and extracts strings.exe from it. The user running the script needs permissions for this folder. If you're using an RMM tool, there should be no issues since it runs as SYSTEM or an admin account. But if you're running it locally, you might need to open the folder in Explorer to grant necessary permissions..

Vulnerability patched in Electron Versions

Stable

Pre Release

Output

The script generates a list each time it discovers a vulnerable file, including the found file, its vulnerable version, and the corresponding updated version that addresses the issue.

Search Results

About

Find Electron Apps Vulnerable to CVE-2023-4863 / CVE-2023-5129

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published