Skip to content

Commit

Permalink
Element Desktop security announcement (#1245)
Browse files Browse the repository at this point in the history
  • Loading branch information
dkasak authored Jan 31, 2022
1 parent 13a9ac2 commit ae4d8b2
Showing 1 changed file with 17 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
date: '2022-01-31'
title: 'High severity vulnerability in Element Desktop 1.9.6 and earlier'
categories:
- Security
author: Matrix Security
---

Element Desktop 1.9.6 and earlier depend on a vulnerable version of Electron, leading to a [High severity vulnerability](/~https://github.com/vector-im/element-desktop/security/advisories/GHSA-mjrg-9f8r-h3m7) in Element Desktop, relating to its functionality for opening downloaded files. If successfully exploited, the vulnerability allows an attacker to open an arbitrary file path on the user's machine using the platform's standard mechanisms, but without the ability to pass additional arguments or data to the program being executed.

However in certain platform configurations, the same vulnerability could allow an attacker to open an arbitrary URL with an arbitrary scheme instead of a file path, again using the platform's standard mechanisms. There [has been research demonstrating](https://positive.security/blog/url-open-rce) that the ability to open arbitrary URLs can sometimes lead to arbitrary code execution.

The attack requires user interaction and the exploit is complex. To the best of our knowledge, the vulnerability has never been exploited in the wild.

Patched in 1.9.7 with further hardening done in 1.9.9 to ensure it's harder to exploit even in light of new Electron vulnerabilities. Please upgrade to 1.9.9 as soon as possible. The vulnerability has been assigned [CVE-2022-23597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23597).

Discovered and reported by [Sirius](/~https://github.com/msrkp) and [TheGrandPew](/~https://github.com/TheGrandPew).

0 comments on commit ae4d8b2

Please sign in to comment.