CVE-2024-39698

HIGH

Electron-builder < 6.3.0 - XSS

Title source: rule
STIX 2.1

Description

electron-updater allows for automatic updates for Electron apps. The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). The patch is available starting from 6.3.0-alpha.6.

Scores

CVSS v3 7.5
EPSS 0.0043
EPSS Percentile 62.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-154 CWE-295
Status published
Products (3)
electron/electron-builder 6.3.0 alpha0 (6 CPE variants)
electron/electron-builder < 6.3.0
npm/electron-updater 0 - 6.3.0-alpha.6npm
Published Jul 09, 2024
Tracked Since Feb 18, 2026