First published: Tue Jul 09 2024(Updated: )
### Observations The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. It executes the following command in a new shell (`process.env.ComSpec` on Windows, usually `C:\Windows\System32\cmd.exe`): https://github.com/electron-userland/electron-builder/blob/140e2f0eb0df79c2a46e35024e96d0563355fc89/packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts#L35-L41 Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. ### Exploitation This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. ### Impact This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). ### Patch This vulnerability was patched in #8295, by comparing the path in the output of `Get-AuthenticodeSignature` with the intended one. The patch is available starting from 6.3.0-alpha.6.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/electron-updater | <=6.3.0-alpha.5 | 6.3.0-alpha.6 |
Electron | <6.3.0 | |
Electron | =6.3.0-alpha0 | |
Electron | =6.3.0-alpha1 | |
Electron | =6.3.0-alpha2 | |
Electron | =6.3.0-alpha3 | |
Electron | =6.3.0-alpha4 | |
Electron | =6.3.0-alpha5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39698 has been classified with a critical severity due to its potential for code execution in Electron applications on Windows.
To mitigate CVE-2024-39698, upgrade the electron-updater package to version 6.3.0-alpha.6 or later.
CVE-2024-39698 affects electron-updater versions up to 6.3.0-alpha.5 and specific alpha versions of electron-builder.
CVE-2024-39698 primarily impacts the electron-updater package during the signature validation process for Electron applications.
While upgrading is the recommended fix for CVE-2024-39698, users can temporarily disable signature validation as a workaround.