cve-2024-46992
Vulnerability from cvelistv5
Published
2025-07-01 01:43
Modified
2025-07-01 14:33
Severity ?
EPSS score ?
Summary
Electron ASAR Integrity bypass by just modifying the content
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46992", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T14:32:53.122906Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T14:33:20.698Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "electron", "vendor": "electron", "versions": [ { "status": "affected", "version": "\u003e= 30.0.0-alpha.1, \u003c 30.0.5" }, { "status": "affected", "version": "\u003e= 31.0.0-alpha.1, \u003c 31.0.0-beta.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 30.0.0-alpha.1 to before 30.0.5 and 31.0.0-alpha.1 to before 31.0.0-beta.1, Electron is vulnerable to an ASAR Integrity bypass. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are not impacted. Specifically this issue can only be exploited if the app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against. This issue has been patched in versions 30.0.5 and 31.0.0-beta.1. There are no workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-354", "description": "CWE-354: Improper Validation of Integrity Check Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-01T01:43:13.767Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/electron/electron/security/advisories/GHSA-xw5q-g62x-2qjc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/electron/electron/security/advisories/GHSA-xw5q-g62x-2qjc" }, { "name": "https://www.electronjs.org/docs/latest/tutorial/fuses", "tags": [ "x_refsource_MISC" ], "url": "https://www.electronjs.org/docs/latest/tutorial/fuses" } ], "source": { "advisory": "GHSA-xw5q-g62x-2qjc", "discovery": "UNKNOWN" }, "title": "Electron ASAR Integrity bypass by just modifying the content" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-46992", "datePublished": "2025-07-01T01:43:13.767Z", "dateReserved": "2024-09-16T16:10:09.019Z", "dateUpdated": "2025-07-01T14:33:20.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-46992\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-01T02:15:20.977\",\"lastModified\":\"2025-07-03T15:14:12.767\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 30.0.0-alpha.1 to before 30.0.5 and 31.0.0-alpha.1 to before 31.0.0-beta.1, Electron is vulnerable to an ASAR Integrity bypass. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are not impacted. Specifically this issue can only be exploited if the app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against. This issue has been patched in versions 30.0.5 and 31.0.0-beta.1. There are no workarounds for this issue.\"},{\"lang\":\"es\",\"value\":\"Electron es un framework de c\u00f3digo abierto para escribir aplicaciones de escritorio multiplataforma con JavaScript, HTML y CSS. Desde la versi\u00f3n 30.0.0-alpha.1 hasta la anterior a la 30.0.5 y desde la 31.0.0-alpha.1 hasta la anterior a la 31.0.0-beta.1, Electron es vulnerable a una omisi\u00f3n de integridad ASAR. Esto solo afecta a las apps que tienen habilitados los fusibles embeddedAsarIntegrityValidation y onlyLoadAppFromAsar. Las apps sin estos fusibles habilitados no se ven afectadas. Este problema es espec\u00edfico de Windows; las apps que usan estos fusibles en macOS no se ven afectadas. En concreto, este problema solo se puede explotar si la app se inicia desde un sistema de archivos al que el atacante tiene acceso de escritura, es decir, la capacidad de editar archivos dentro del paquete .app en macOS, contra el cual se supone que estos fusibles protegen. Este problema se ha corregido en las versiones 30.0.5 y 31.0.0-beta.1. No existen soluciones alternativas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-354\"}]}],\"references\":[{\"url\":\"https://github.com/electron/electron/security/advisories/GHSA-xw5q-g62x-2qjc\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.electronjs.org/docs/latest/tutorial/fuses\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.