-
Notifications
You must be signed in to change notification settings - Fork 358
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Element Desktop security announcement (#1245)
- Loading branch information
Showing
1 changed file
with
17 additions
and
0 deletions.
There are no files selected for viewing
17 changes: 17 additions & 0 deletions
17
gatsby/content/blog/2022/01/2022-01-30-element-desktop-security-announcement.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
--- | ||
date: '2022-01-31' | ||
title: 'High severity vulnerability in Element Desktop 1.9.6 and earlier' | ||
categories: | ||
- Security | ||
author: Matrix Security | ||
--- | ||
|
||
Element Desktop 1.9.6 and earlier depend on a vulnerable version of Electron, leading to a [High severity vulnerability](/~https://github.com/vector-im/element-desktop/security/advisories/GHSA-mjrg-9f8r-h3m7) in Element Desktop, relating to its functionality for opening downloaded files. If successfully exploited, the vulnerability allows an attacker to open an arbitrary file path on the user's machine using the platform's standard mechanisms, but without the ability to pass additional arguments or data to the program being executed. | ||
|
||
However in certain platform configurations, the same vulnerability could allow an attacker to open an arbitrary URL with an arbitrary scheme instead of a file path, again using the platform's standard mechanisms. There [has been research demonstrating](https://positive.security/blog/url-open-rce) that the ability to open arbitrary URLs can sometimes lead to arbitrary code execution. | ||
|
||
The attack requires user interaction and the exploit is complex. To the best of our knowledge, the vulnerability has never been exploited in the wild. | ||
|
||
Patched in 1.9.7 with further hardening done in 1.9.9 to ensure it's harder to exploit even in light of new Electron vulnerabilities. Please upgrade to 1.9.9 as soon as possible. The vulnerability has been assigned [CVE-2022-23597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23597). | ||
|
||
Discovered and reported by [Sirius](/~https://github.com/msrkp) and [TheGrandPew](/~https://github.com/TheGrandPew). |