electron-builder: 22.3.5electron-updater: 4.2.4dead150 is only a partial fix for the signature verification bypass issue recently disclosed by Doyensec. While it is no longer possible to trigger the parse errors with single or double quotes as of dead150, there are other ways to cause them.
From the report:
we believe that other attack payloads for the same vulnerable code path still [exist] in Electron-Builder.
In my opinion, the root cause of the vulnerability lies in the fact that even though signature verification is failing, the update is still installed:
https://github.com/electron-userland/electron-builder/blob/caebf37282a17786cff7c948eeec8fbb21b37a68/packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts#L37-L38
So, even though an error is encountered, null is resolved and the update is installed anyway. I opened this issue because I was hoping to start a discussion on the following:
strictSignatureVerification: true in the electron-builder config) be accepted?Is this still relevant? If so, what is blocking it? Is there anything you can do to help move it forward?
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs.
This is still relevant
🛠️ A fix has been provided for this issue. Please reference: https://github.com/418sec/electron-builder/pull/1
🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.
Most helpful comment
🛠️ A fix has been provided for this issue. Please reference: https://github.com/418sec/electron-builder/pull/1
🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.