Electron vulnerable to remote command execution
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 19, 2023
Description
Published by the National Vulnerability Database
Aug 6, 2017
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Oct 19, 2023
Last updated
Oct 19, 2023
Electron before 1.6.8 allows remote command execution because of a
nodeIntegration
bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, achrome-devtools://devtools/bundled/inspector.html
window could be used to eval a Node.jschild_process.execFile
API call.References