Security Analysis Leads to Discovery of Vulnerabilities in 18 Electron Applications


A team of researchers from various companies has analyzed Electron-based desktop applications and ended up discovering vulnerabilities in several widely used pieces of software.

A team of researchers from various companies has analyzed Electron-based desktop applications and ended up discovering vulnerabilities in several widely used pieces of software.

Electron is a free and open source framework for developing cross-platform desktop applications. It has been used to build some very popular applications, including Microsoft Teams, WhatsApp, and Slack.

The research project targeting Electron apps has been dubbed ElectroVolt and the findings were presented last week at the Black Hat conference.

Mohan Sri Rama Krishna Pedhapati, a security consultant at Cure53 and one of the researchers involved in the project, told SecurityWeek that they have identified vulnerabilities in 18 applications. Impacted vendors have been informed and they all released patches.

Security holes have been found in Microsoft Teams, Discord, Visual Studio Code, Basecamp, Mattermost, Element, Notion, JupyterLab, and Rocket.Chat, among others.

Nearly all of the exploits, many of which involve chaining several flaws, can lead to remote code execution on the targeted system. In Microsoft Teams, the white hat hackers found a local file read issue.

In many cases, minimal user interaction is required to trigger the exploits, such as clicking on a link or simply accessing a certain section of the application. The researchers said an attack is likely to have a high success rate as users will often click on things and open messages in Electron apps.

A majority of the flaws have been rated ‘critical’ and the researchers earned a total of approximately $60,000 for disclosing them to their respective vendors.

In addition to detailing their findings at Black Hat, the researchers published individual blog posts describing some of the Electrovolt vulnerabilities. Proof-of-concept (PoC) code and videos showing some of the exploits in action are also available.


By Eduard Kovacs on Wed, 17 Aug 2022 11:21:26 +0000
Original link