CVE-2024-46992
JavaScript vulnerability analysis and mitigation

Overview

Electron, an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS, was found to contain an ASAR Integrity bypass vulnerability (CVE-2024-46992). The vulnerability affects versions from 30.0.0-alpha.1 to before 30.0.5 and 31.0.0-alpha.1 to before 31.0.0-beta.1. This security issue was discovered and reported by Just-Hack-For-Fun (GitHub Advisory).

Technical details

The vulnerability is specifically related to ASAR (Electron's Archive format) Integrity bypass. It only affects applications that have both the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. The issue has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access required with low attack complexity and no user interaction needed (GitHub Advisory).

Impact

The vulnerability is specific to Windows systems, while applications using these fuses on macOS are not impacted. The issue can only be exploited if the application is launched from a filesystem where the attacker has write access, such as the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against (GitHub Advisory).

Mitigation and workarounds

There are no application-side workarounds available for this vulnerability. The only mitigation is to update to the patched versions: Electron 30.0.5 or 31.0.0-beta.1 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management