Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXE0M20tZmZ3ci1ycGNj

SSL Validation Defaults to False in electron-packager

Affected versions of electron-packager configure the generated application to disable SSL certificate verification by default.

This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one.

This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API.

Recommendation

  1. Update to version 7.0.0 or later.
  2. Delete the electron-download cache folder, which is by default located at ~/.electron.
Permalink: https://github.com/advisories/GHSA-q43m-ffwr-rpcc
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXE0M20tZmZ3ci1ycGNj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 5 years ago
Updated: over 1 year ago


Identifiers: GHSA-q43m-ffwr-rpcc, CVE-2016-10534
References: Repository: https://github.com/electron-userland/electron-packager
Blast Radius: 0.0

Affected Packages

npm:electron-packager
Dependent packages: 703
Dependent repositories: 23,515
Downloads: 768,578 last month
Affected Version Ranges: >= 5.2.1, < 7.0.0
Fixed in: 7.0.0
All affected versions: 5.2.1, 6.0.0, 6.0.1, 6.0.2
All unaffected versions: 3.0.0, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.2.0, 5.0.0, 5.0.1, 5.0.2, 5.1.0, 5.1.1, 5.2.0, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.1.0, 7.2.0, 7.3.0, 7.4.0, 7.5.0, 7.5.1, 7.6.0, 7.7.0, 8.0.0, 8.1.0, 8.2.0, 8.3.0, 8.4.0, 8.5.0, 8.5.1, 8.5.2, 8.6.0, 8.7.0, 8.7.1, 8.7.2, 9.0.0, 9.0.1, 9.1.0, 10.0.0, 10.1.0, 10.1.1, 10.1.2, 11.0.0, 11.0.1, 11.1.0, 11.2.0, 11.2.1, 12.0.0, 12.0.1, 12.0.2, 12.1.0, 12.1.1, 12.1.2, 12.2.0, 13.0.0, 13.0.1, 13.1.0, 13.1.1, 14.0.0, 14.0.1, 14.0.2, 14.0.3, 14.0.4, 14.0.5, 14.0.6, 14.1.0, 14.1.1, 14.2.0, 14.2.1, 15.0.0, 15.1.0, 15.2.0, 15.3.0, 15.4.0, 15.5.0, 15.5.1, 15.5.2, 16.0.0, 17.0.0, 17.1.0, 17.1.1, 17.1.2