Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-44402
HistoryDec 01, 2023 - 9:45 p.m.

CVE-2023-44402 ASAR Integrity bypass via filetype confusion in electron

2023-12-0121:45:18
CWE-345
GitHub_M
www.cve.org
cve-2023-44402; asar integrity bypass; electron; macos; filesystem; write access; update; patched version; desktop applications.

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L

0.001 Low

EPSS

Percentile

19.7%

Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against. There are no app side workarounds, you must update to a patched version of Electron.

CNA Affected

[
  {
    "vendor": "electron",
    "product": "electron",
    "versions": [
      {
        "version": "< 22.3.24",
        "status": "affected"
      },
      {
        "version": ">= 23.0.0-alpha.1, <= 23.3.13",
        "status": "affected"
      },
      {
        "version": ">= 24.0.0-alpha.1, < 24.8.3",
        "status": "affected"
      },
      {
        "version": ">= 25.0.0-alpha.1, < 25.8.1",
        "status": "affected"
      },
      {
        "version": ">= 26.0.0-alpha.1, < 26.2.1",
        "status": "affected"
      },
      {
        "version": ">= 27.0.0-alpha.1, < 27.0.0-alpha.7",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L

0.001 Low

EPSS

Percentile

19.7%

Related for CVELIST:CVE-2023-44402