// For flags

CVE-2024-27303

electron-builder's NSIS installer - execute arbitrary code on the target machine (Windows only)

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

electron-builder is a solution to package and build a ready for distribution Electron, Proton Native app for macOS, Windows and Linux. A vulnerability that only affects eletron-builder prior to 24.13.2 in Windows, the NSIS installer makes a system call to open cmd.exe via NSExec in the `.nsh` installer script. NSExec by default searches the current directory of where the installer is located before searching `PATH`. This means that if an attacker can place a malicious executable file named cmd.exe in the same folder as the installer, the installer will run the malicious file. Version 24.13.2 fixes this issue. No known workaround exists. The code executes at the installer-level before the app is present on the system, so there's no way to check if it exists in a current installer.

electron-builder es una solución para empaquetar y crear una aplicación Electron, Proton Native lista para su distribución para macOS, Windows y Linux. Una vulnerabilidad que solo afecta a eletron-builder anterior a 24.13.2 en Windows, el instalador de NSIS realiza una llamada al sistema para abrir cmd.exe a través de NSExec en el script del instalador `.nsh`. NSExec busca de forma predeterminada el directorio actual donde se encuentra el instalador antes de buscar `PATH`. Esto significa que si un atacante puede colocar un archivo ejecutable malicioso llamado cmd.exe en la misma carpeta que el instalador, el instalador ejecutará el archivo malicioso. La versión 24.13.2 soluciona este problema. No existe ningún workaround. El código se ejecuta en el nivel del instalador antes de que la aplicación esté presente en el sistema, por lo que no hay forma de verificar si existe en un instalador actual.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-02-22 CVE Reserved
  • 2024-03-06 CVE Published
  • 2024-03-07 EPSS Updated
  • 2024-08-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-426: Untrusted Search Path
  • CWE-427: Uncontrolled Search Path Element
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Electron-userland
Search vendor "Electron-userland"
Electron-builder
Search vendor "Electron-userland" for product "Electron-builder"
< 24.13.2
Search vendor "Electron-userland" for product "Electron-builder" and version " < 24.13.2"
en
Affected