electerm@2.16.6

Terminal/ssh/telnet/serialport/sftp client(linux, mac, win)

  • latest version

    3.9.15

  • first published

    10 years ago

  • latest version published

    6 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the electerm package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Use of Password Hash With Insufficient Computational Effort

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the encrypt process. An attacker can compromise the confidentiality and integrity of synced bookmark and profile data by exploiting deterministic encryption with a fixed zero IV, constant KDF salt, and lack of message authentication, allowing them to crack common passwords across installations and perform undetected ciphertext modifications.

    How to fix Use of Password Hash With Insufficient Computational Effort?

    Upgrade electerm to version 3.9.5 or higher.

    <3.9.5
    • C
    Unsafe Dependency Resolution

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the runWidget function. An attacker can achieve arbitrary code execution by supplying crafted input that exploits path traversal to load and execute malicious JavaScript files from the filesystem through the renderer process. This is only exploitable if an attacker is able to execute JavaScript in the renderer process, such as through a malicious plugin or a cross-site scripting flaw in the embedded webview.

    How to fix Unsafe Dependency Resolution?

    Upgrade electerm to version 3.7.16 or higher.

    <3.7.16
    • H
    Cleartext Storage of Sensitive Information

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Cleartext Storage of Sensitive Information in the getConstants process, which serializes the entire process.env object and exposes it to the renderer context as window.pre.env. An attacker can access sensitive environment variables and exfiltrate secrets by executing JavaScript within the renderer, such as through a malicious plugin, cross-site scripting, or terminal hyperlink execution. This is only exploitable if an attacker can execute JavaScript in the renderer context or has local access to the application's "Info" modal.

    How to fix Cleartext Storage of Sensitive Information?

    Upgrade electerm to version 3.9.5 or higher.

    <3.9.5
    • H
    Arbitrary Argument Injection

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Arbitrary Argument Injection via the openFileWithEditor process. An attacker can execute arbitrary commands on the user's system by crafting a malicious filename containing shell metacharacters, which are then passed unsanitized to the system editor when a user attempts to edit a file from an untrusted SSH server. This is only exploitable if the user opens files for editing from an attacker-controlled or compromised SSH server.

    How to fix Arbitrary Argument Injection?

    Upgrade electerm to version 3.7.9 or higher.

    <3.7.9
    • H
    Open Redirect

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Open Redirect in the shell.openExternal process. An attacker can execute arbitrary code or access local files by crafting a malicious URI in terminal output and enticing a user to click the displayed link. This can result in the execution of dangerous protocol handlers or the exfiltration of sensitive data.

    How to fix Open Redirect?

    There is no fixed version for electerm.

    >=0.0.0
    • C
    Arbitrary Command Injection

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Arbitrary Command Injection via the runLinux function. An attacker can execute arbitrary system commands, tamper with local files, and escalate compromise of development or runtime assets by supplying a crafted remote version string or release name that is incorporated into an exec command without validation. This is only exploitable if the attacker can control the remote release metadata served by the project's update server.

    How to fix Arbitrary Command Injection?

    Upgrade electerm to version 3.3.8 or higher.

    <3.3.8
    • C
    Command Injection

    electerm is an open-sourced terminal/ssh/telnet/serialport/sftp client

    Affected versions of this package are vulnerable to Command Injection via the runMac and runLinux functions. An attacker can execute arbitrary system commands and compromise the system by supplying malicious remote release metadata that is incorporated into shell commands without validation.

    How to fix Command Injection?

    Upgrade electerm to version 3.3.8 or higher.

    <3.3.8