7.2
CWE
20
Advisory Published
Updated

CVE-2022-29257: Electron's AutoUpdater module fails to validate certain nested components of the bundle

First published: Mon Jun 13 2022(Updated: )

Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. This kind of attack would require significant privileges in a potential victim's own auto updating infrastructure and the ease of that attack entirely depends on the potential victim's infrastructure security. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. There are no known workarounds.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Electronjs Electron<15.5.0
Electronjs Electron>=16.0.1<16.2.0
Electronjs Electron>=17.0.1<17.2.0
Electronjs Electron=16.0.0-beta1
Electronjs Electron=16.0.0-beta2
Electronjs Electron=16.0.0-beta3
Electronjs Electron=16.0.0-beta4
Electronjs Electron=16.0.0-beta5
Electronjs Electron=16.0.0-beta6
Electronjs Electron=16.0.0-beta7
Electronjs Electron=16.0.0-beta8
Electronjs Electron=16.0.0-beta9
Electronjs Electron=17.0.0-beta1
Electronjs Electron=17.0.0-beta2
Electronjs Electron=17.0.0-beta3
Electronjs Electron=17.0.0-beta4
Electronjs Electron=17.0.0-beta5
Electronjs Electron=17.0.0-beta6
Electronjs Electron=17.0.0-beta7
Electronjs Electron=17.0.0-beta8
Electronjs Electron=17.0.0-beta9
Electronjs Electron=18.0.0-beta1
Electronjs Electron=18.0.0-beta2
Electronjs Electron=18.0.0-beta3
Electronjs Electron=18.0.0-beta4
Electronjs Electron=18.0.0-beta5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-29257?

    CVE-2022-29257 is a vulnerability in Electron framework that allows attackers who have control over a given app's update server/storage to serve maliciously crafted updates.

  • Which versions of Electron are affected by CVE-2022-29257?

    Versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 of Electron are affected by CVE-2022-29257.

  • How severe is CVE-2022-29257?

    CVE-2022-29257 has a severity score of 7.2, which is considered high.

  • How can I fix CVE-2022-29257?

    To fix CVE-2022-29257, update to Electron version 18.0.0-beta.6, 17.2.0, 16.2.6, or 15.5.5 or later.

  • Where can I find more information about CVE-2022-29257?

    More information about CVE-2022-29257 can be found at the following link: [https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97](https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203