TomSellers,

Roughly 2 weeks ago Google patched a critical vulnerability, CVE-2023-4863, that was being exploited in the wild. The broad impact of the root cause of the vuln and the fact that it will have a long tail of unpatched software has been poorly communicated. You can read more in @dangoodin 's excellent article on Ars Technica.

As pointed out in the article above, Electron is based on Chromium and is impacted. Electron is bundled in a ton of apps that people might overlook.

I threw together the following shell command to help macOS audit which versions of Electron apps are installed.

find /Applications -type f -name "*Electron Framework*" -exec <br></br>  sh -c "echo  "{}" && strings "{}" | grep '^Chrome/[0-9.]* Electron/[0-9]' | head -n1 && echo " ;<br></br>

When run, you should see something similar to the following:

/Applications/Visual Studio Code.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework<br></br>Chrome/114.0.5735.289 Electron/25.8.1<br></br><br></br>/Applications/Slack.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework<br></br>Chrome/116.0.5845.188 Electron/26.2.1<br></br>

#Security #Electron #CVE20234863 #CVE-2023-4863

TomSellers,

The patched (fixed) versions of Electron are

Electron v22.3.24, v24.8.3, v25.8.1 - released September 13 and fixes CVE-2023-4863 as well as CVE-2023-4763, CVE-2023-4762, and CVE-2023-4761

Electron v26.2.1 - released September 13 and updates Chrome. Fixes the CVEs but does not call them out

Here are the fixed versions of some other common software:

GitHub Desktop v3.3.3 - bumps Electron to v24.8.3 which fixes CVE-2023-4863

VS Code 1.82.2 - bumps Electron to v25.8.1 which fixes CVE-2023-4863

Signal Desktop v6.30.2 - bumps Electron to v25.8.1 which fixes CVE-2023-4863

Slack v4.34.119 - bumps Electron to v26.2.1, indicates a security fix but doesn't label it with its highest risk label

Apple iOS 16.7, 17.0.1
Apple iPadOS 16.7, 17.0.1
Apple macOS Ventura 13.6
Apple macOS Monterey 12.7
Apple watchOS 9.6.3, 10.0.1
Apple Safari 16.6.1

Google Chrome 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows

Mozilla Firefox 117.0.1, ESR 102.15.1, ESR 115.2.1
Mozilla Thunderbird 102.15.1, 115.2.2

Edit: Added Electron v22.3.24 to the patched list. Thanks @delfuego

delfuego,

@TomSellers Note that Electron patched this back to v22 and forward to v26 and v27 (in beta), not just v24 and v25; the fixed versions are:

22.3.24, 24.8.3, 25.8.1, 26.2.1, 27.0.0-beta.2

https://security.snyk.io/vuln/SNYK-JS-ELECTRON-5892810

mjgardner,
@mjgardner@social.sdf.org avatar

@delfuego @TomSellers @electronjs Expanded to check against all #libwebp-patched #Electron versions:

find /Applications -type f -name 'Electron Framework' -exec \
perl -Mversion=0.77 -nE \
'@safe = map version->parse($), qw(22.3.24 24.8.3 25.8.1 26.2.1);
next unless m{Chrome/[0-9.]+ Electron/([0-9.]+)}; $ver = version->parse($1);
if ($ver < (grep int $
->numify >= int $ver->numify, @safe)[0]) {
say "vulnerable Electron $ver found in $ARGV"; next
}' {} ;

mjgardner, (edited )
@mjgardner@social.sdf.org avatar

@delfuego @TomSellers @electronjs After using the above command and pulling down any available updates, I still have the following vulnerable #Electron-based apps on my #Mac:

#AdGuard for #Safari (Electron v18.3.15)
#HTTPie (21.2.0)
#Jabra Direct (16.2.2)
#Keybase (22.1.0)
#Logitech Logi Options+ (23.1.1)
#Logseq (24.6.3)
#Postman (18.3.5) @getpostman
#Rancher Desktop (20.3.8)
#Microsoft Teams (19.1.8)
#WhatsApp (13.6.9)

mjgardner,
@mjgardner@social.sdf.org avatar

@delfuego @TomSellers @electronjs @getpostman Some of those numbers are deceptively lower than the current supported #Electron releases: https://www.electronjs.org/docs/latest/tutorial/electron-timelines
But they all include Electron versions released in the past 18 months.

Like a lot of #JavaScript apps, Electron iterates versions really fast. #SemanticVersioning is not a guide to the chronological age of software, only its compatibility with other software.

TomSellers,

@mjgardner @dangoodin

I can confirm that a fresh install of Keybase on macoS is using 22.1.0 which has not been patched and will go EoL on October 10. I find this very concerning from security software.

I can also confirm that a fresh install of Microsoft Teams on macOS is using Electron 19.1.8 which has not been patched and went EoL last November.

delfuego,

@TomSellers @mjgardner @dangoodin The Teams one is insane. Microsoft happily distributes their premiere communications platform atop a version of Electron that EOLed a year ago; if our agency adhered to its own rules, we would have to remove it from every single device until MS released a new version built atop a currently-supported framework.

alancheilek,
@alancheilek@mastodon.me.uk avatar

@mjgardner @delfuego @TomSellers @electronjs @getpostman

I see that Microsoft also uses Electron 19.1.8 in ! (Seems like there might be a vector to attack that, somehow, since one can send messages to another user?)
is vulnerable with 22.3.14
Contrary to what I see in the release notes, my updated is on 25.8.0 (not .1)
has 25.5.0

TomSellers,

@alancheilek VS Code has an update that will address this. The latest version is using Electron 25.8.1 which is patched.

alancheilek,
@alancheilek@mastodon.me.uk avatar

@TomSellers
Whoops, you're quite right ... it takes so long to update that I got bored and forgot to click the restart button! Thanks.

steely_glint,
@steely_glint@chaos.social avatar

@alancheilek @TomSellers
The one that worries me is the secure messaging app #wire which seems to be on
Chrome/108.0.5359.215 Electron/22.3.8

Isn't that a vulnerable version?

TomSellers,

@steely_glint @alancheilek Electron v22.3.8 was released 2023-05-03 and is indeed vulnerable to this vuln and quite a few others.

steely_glint,
@steely_glint@chaos.social avatar

@TomSellers @alancheilek Thanks.

Time to nag #wire - I've notified their security page let's see what they say.

scruss,
@scruss@xoxo.zone avatar

@mjgardner @TomSellers @electronjs

Congrats to Dropbox for doing an update and still being on Electron 13.1.0!

TomSellers,

In my earlier thread I should have recommended that folks be on the lookout for end of life(EoL) versions of Electron that are bundled with software that is itself updated to the latest version. I've observed a case where fully updated software was using Electron 22.x.x that isn't EoL yet, but will be in 2 weeks. In those cases I strongly suggest you notify your vendor and, if it is paid software, pressure them to migrate to a supported version ASAP.

Note: There IS a patched version of 22.x.x which is 22.3.24.

Reference: https://www.electronjs.org/docs/latest/tutorial/electron-timelines

#Security #Electron #SBOM #CVE20234863 #CVE-2023-4863 #CVE_2023_4863

dangoodin,

@TomSellers Slack told me that the vuln was fixed in the desktop release 4.34.119 for Mac and Windows.

TomSellers,

@dangoodin Thanks. I included that version in the post linked below based on my reading of the Slack release notes for macOS. It's good to have it officially confirmed and to know it covers Windows too.

https://infosec.exchange/@TomSellers/111126352647377681

anathema_device,
@anathema_device@bne.social avatar

@TomSellers @dangoodin Thank you for this. I found 3 apps which have this framework, none of which I even use. Ditched :)

TomSellers,

@anathema_device Woot, great outcome! Glad to help.

VE2UWY,
@VE2UWY@mastodon.radio avatar

@TomSellers @dangoodin

Wow - thanks. MacOS 13.5.2 (Ventura) shows (truncated):

/Applications/Dropbox.app/Contents/Frameworks/Electron Framework.framework/

/Applications/Slack.app/Contents/Frameworks/Electron Framework.framework/

/Applications/Discord.app/Contents/Frameworks/Electron Framework.framework/

dangoodin,

@VE2UWY @TomSellers Are you sure? I think most if not all of these have been patched.

TomSellers,

@dangoodin @VE2UWY The command shows all, patched or not. I think they said in another comment that they were going to review the output later.

t_slider,

@TomSellers @dangoodin the output of said command is rather alarming on my machine 🤦‍♂️😱

mjgardner,
@mjgardner@social.sdf.org avatar

@t_slider @TomSellers @dangoodin The output lists all apps using #Electron regardless of their vulnerability. Here is an expanded command that only lists Electron apps that have not been updated against the #CVE20234863 #libwebp vulnerability: https://social.sdf.org/@mjgardner/111126922716051872

I agree that the number of apps using Electron is alarming in itself, though.

hrbrmstr,
@hrbrmstr@mastodon.social avatar

@TomSellers can i toss this w/attrib in tomorrow's newsletter? super good stuff.

TomSellers,

@hrbrmstr Go for it!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • security
  • DreamBathrooms
  • magazineikmin
  • modclub
  • khanakhh
  • Youngstown
  • rosin
  • mdbf
  • slotface
  • Durango
  • ngwrru68w68
  • thenastyranch
  • kavyap
  • InstantRegret
  • cubers
  • provamag3
  • osvaldo12
  • Leos
  • anitta
  • everett
  • ethstaker
  • GTA5RPClips
  • tester
  • cisconetworking
  • megavids
  • tacticalgear
  • normalnudes
  • JUstTest
  • lostlight
  • All magazines