First published: Fri Dec 01 2023(Updated: )
### Impact This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` [fuses](https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the `resources` folder in your app installation on Windows which these fuses are supposed to protect against. ### Workarounds There are no app side workarounds, you must update to a patched version of Electron. ### Fixed Versions * `27.0.0-alpha.7` * `26.2.1` * `25.8.1` * `24.8.3` * `22.3.24` ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Electronjs Electron | <=22.3.24 | |
Electronjs Electron | >=23.0.0<=23.3.14 | |
Electronjs Electron | >=24.0.0<=24.8.3 | |
Electronjs Electron | >=25.0.0<=25.8.1 | |
Electronjs Electron | >=26.0.0<=26.2.1 | |
Electronjs Electron | =27.0.0-alpha1 | |
Electronjs Electron | =27.0.0-alpha2 | |
Electronjs Electron | =27.0.0-alpha3 | |
Electronjs Electron | =27.0.0-alpha4 | |
Electronjs Electron | =27.0.0-alpha5 | |
Electronjs Electron | =27.0.0-alpha6 | |
npm/electron | >=23.0.0-alpha.1<=23.3.13 | |
npm/electron | >=27.0.0-alpha.1<27.0.0-alpha.7 | 27.0.0-alpha.7 |
npm/electron | >=26.0.0-alpha.1<26.2.1 | 26.2.1 |
npm/electron | >=25.0.0-alpha.1<25.8.1 | 25.8.1 |
npm/electron | >=24.0.0-alpha.1<24.8.3 | 24.8.3 |
npm/electron | <22.3.24 | 22.3.24 |
<=22.3.24 | ||
>=23.0.0<=23.3.14 | ||
>=24.0.0<=24.8.3 | ||
>=25.0.0<=25.8.1 | ||
>=26.0.0<=26.2.1 | ||
=27.0.0-alpha1 | ||
=27.0.0-alpha2 | ||
=27.0.0-alpha3 | ||
=27.0.0-alpha4 | ||
=27.0.0-alpha5 | ||
=27.0.0-alpha6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
This vulnerability allows an attacker to bypass ASAR integrity checks in Electron, potentially leading to unauthorized code execution in affected apps with specific fuses enabled.
This vulnerability only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses enabled in Electron.
To check if your app is affected, verify if the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses are enabled in your Electron configuration.
The severity of this vulnerability is medium with a CVSS score of 6.1.
To fix this vulnerability, update Electron to version 22.3.24 or higher and ensure that the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses are not enabled.