Lucene search

K
osvGoogleOSV:GHSA-7M48-WC93-9G85
HistoryDec 01, 2023 - 9:32 p.m.

ASAR Integrity bypass via filetype confusion in electron

2023-12-0121:32:06
Google
osv.dev
4
asar
integrity
bypass
electron
filetype confusion
macos
security issue
filesystem
workarounds
patched versions
email

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

19.7%

Impact

This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar [fuses] (https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS.

Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against.

Workarounds

There are no app side workarounds, you must update to a patched version of Electron.

Fixed Versions

  • 27.0.0-alpha.7
  • 26.2.1
  • 25.8.1
  • 24.8.3
  • 23.3.14
  • 22.3.24

For more information

If you have any questions or comments about this advisory, email us at [email protected]

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

19.7%

Related for OSV:GHSA-7M48-WC93-9G85