Use of Password Hash With Insufficient Computational Effortelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the encrypt process. An attacker can compromise the confidentiality and integrity of synced bookmark and profile data by exploiting deterministic encryption with a fixed zero IV, constant KDF salt, and lack of message authentication, allowing them to crack common passwords across installations and perform undetected ciphertext modifications.
How to fix Use of Password Hash With Insufficient Computational Effort? Upgrade electerm to version 3.9.5 or higher.
| |
Unsafe Dependency Resolutionelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the runWidget function. An attacker can achieve arbitrary code execution by supplying crafted input that exploits path traversal to load and execute malicious JavaScript files from the filesystem through the renderer process. This is only exploitable if an attacker is able to execute JavaScript in the renderer process, such as through a malicious plugin or a cross-site scripting flaw in the embedded webview.
How to fix Unsafe Dependency Resolution? Upgrade electerm to version 3.7.16 or higher.
| |
Cleartext Storage of Sensitive Informationelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information in the getConstants process, which serializes the entire process.env object and exposes it to the renderer context as window.pre.env. An attacker can access sensitive environment variables and exfiltrate secrets by executing JavaScript within the renderer, such as through a malicious plugin, cross-site scripting, or terminal hyperlink execution. This is only exploitable if an attacker can execute JavaScript in the renderer context or has local access to the application's "Info" modal.
How to fix Cleartext Storage of Sensitive Information? Upgrade electerm to version 3.9.5 or higher.
| |
Arbitrary Argument Injectionelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Arbitrary Argument Injection via the openFileWithEditor process. An attacker can execute arbitrary commands on the user's system by crafting a malicious filename containing shell metacharacters, which are then passed unsanitized to the system editor when a user attempts to edit a file from an untrusted SSH server. This is only exploitable if the user opens files for editing from an attacker-controlled or compromised SSH server.
How to fix Arbitrary Argument Injection? Upgrade electerm to version 3.7.9 or higher.
| |
Open Redirectelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Open Redirect in the shell.openExternal process. An attacker can execute arbitrary code or access local files by crafting a malicious URI in terminal output and enticing a user to click the displayed link. This can result in the execution of dangerous protocol handlers or the exfiltration of sensitive data.
How to fix Open Redirect? There is no fixed version for electerm.
| |
Arbitrary Command Injectionelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Arbitrary Command Injection via the runLinux function. An attacker can execute arbitrary system commands, tamper with local files, and escalate compromise of development or runtime assets by supplying a crafted remote version string or release name that is incorporated into an exec command without validation. This is only exploitable if the attacker can control the remote release metadata served by the project's update server.
How to fix Arbitrary Command Injection? Upgrade electerm to version 3.3.8 or higher.
| |
Command Injectionelecterm is an open-sourced terminal/ssh/telnet/serialport/sftp client
Affected versions of this package are vulnerable to Command Injection via the runMac and runLinux functions. An attacker can execute arbitrary system commands and compromise the system by supplying malicious remote release metadata that is incorporated into shell commands without validation.
How to fix Command Injection? Upgrade electerm to version 3.3.8 or higher.
| |