ãã«ãªã³ã§éå¬ãããCure53ã®ã¤ãã³ããCureConã®è³æã§ãã
While browsing Twitter Iâve noticed ElectronJS remote code execution vulnerability in protocol handler. That sounds severe. As stated in official description, for application to be vulnerable is enough to register itself as default handler for some protocol. I had one application based on Electron installed on my laptop that I was looking into some time agoâââExodus cryptocurrencies wallet. I knew
A remote code execution vulnerability has been discovered affecting Electron apps that use custom protocol handlers. This vulnerability has been assigned the CVE identifier CVE-2018-1000006. Affected Platformsâ Electron apps designed to run on Windows that register themselves as the default handler for a protocol, like myapp://, are vulnerable. Such apps can be affected regardless of how the proto
æè¡ãæ´»ãããæ°ãã価å¤ãåµé ãã DeNAã®ã¨ã³ã¸ãã¢ã¯ãæ³åãè¶ ããDelightãå±ããããã«ä½ãã§ããããèããæè¡åã¨çºæ³åã§æ°ãã価å¤ãçã¿åºãã¦ãã¾ãã 夿§ãªå°éæ§ãæã£ãã¨ã³ã¸ãã¢ãåç£ç¢ç£¨ããäºãã«åºæ¿ãåããç°å¢ãå¶åº¦ããããªãæé·ã¸ã¨ã¤ãªãã¾ãã
2018å¹´4æ25æ¥ããã¡ã¾ãã¦ã ãCodeIQãã®ããã°ã©ãã³ã°è 試ããµã¼ãã¹ãå¹´å確ç´ã¹ã«ã¦ããµã¼ãã¹ã¯ã ITã¨ã³ã¸ãã¢ã®ããã®å¹´å確ç´ã¹ã«ã¦ããµã¼ãã¹ãmoffers by CodeIQãhttps://moffers.jp/ ã¸ä¸æ¬åãããã¾ããã ããã¾ã§å¤ãã®ITã¨ã³ã¸ãã¢ã®æ¹ã«ãCodeIQãããå©ç¨ããã ãã¾ãã¦ã æ¹ãã¦å¿ããæ·±ã御礼ç³ãä¸ãã¾ãã ã¾ããã¨ã³ã¸ãã¢ã®ããã®Webãã¬ã¸ã³ãCodeIQ MAGAZINEãã¯ã ãªã¯ããNEXTã¸ã£ã¼ãã«( https://next.rikunabi.com/journal/ )ã«ä¸é¨ã®è¨äºã®ç§»è¡ãäºå®ãã¦ããã¾ãã ä»å¾ã¯ãmoffers by CodeIQãã«ã¦ã ITã¨ã³ã¸ãã¢ã®çæ§ã®ããè¯ã転è·ããµãã¼ãããããã«ãããä¸å±¤åªãã¦ã¾ããã¾ãã®ã§ã å¼ãç¶ããæé¡§ã®ã»ã©ä½åãããããé¡ãç³ãä¸ãã¾ãã ã¾ããCod
ãã®ãã¡ããå°ããã¡ãã¨æ¸ãã¾ãããã¨ããããæéããªãã®ã§çµè«ã ãæ¸ãã¨ãã¿ã¤ãã«ãå ¨ã¦ã§Electronã§ã¢ããªãæ¸ãå ´åã¯æ°åãã¨æ ¹æ§ã§XSSãçºçãããªãããã«ããªããã°ãªããªãã ããã¾ã§Webã¢ããªã±ã¼ã·ã§ã³ä¸ã§XSSãåå¨ããã¨ãã¦ããå½±é¿ç¯å²ã¯ãã®Webã¢ããªã±ã¼ã·ã§ã³ã®ä¸ã«çã¾ãã®ã§ãWebã¢ããªã±ã¼ã·ã§ã³ã®æä¾å´ãããã許容ããã®ã§ããã°XSSã®åå¨ã«ç®ãã¤ãããã¨ãã§ãããããããElectronã¢ããªã§DOM-based XSSãä¸ãæã§ãçºçããã¨ã(ãããã)確å®ã«ä»»æã³ã¼ãå®è¡ã¸ã¨ã¤ãªãããå©ç¨è ã®PCã®(ãã®ã¦ã¼ã¶ã¼æ¨©éã§ã®)å ¨æ©è½ãæ»æè ã«ãã£ã¦å©ç¨ã§ããã ãã®ãããElectronã§ã¢ããªã±ã¼ã·ã§ã³ã使ããéçºè ã¯æ°åãã¨æ ¹æ§ã§XSSãå®å ¨ã«ã¤ã¶ããªããã°ãªããªãã nodeIntegration:falseãContent-Security-Pol
Electronã使ã£ã¦ãã©ã¦ã¶ã®ãããªã¢ããªã±ã¼ã·ã§ã³ãä½ãå ´åã«ã¯ webviewã¿ã°ã使ç¨ããããä¾ãã°ãã¢ããªã±ã¼ã·ã§ã³å ã«example.jpã®ãµã¤ãã表示ããã«ã¯ä»¥ä¸ã®ããã«HTMLã«è¨è¿°ããã <webview src="http://example.jp/"></webview> ããã§ãwebviewã¿ã°ã«allowpopups屿§ãä»ä¸ããã¨ãexample.jpãµã¤ãå ã®ã³ã¼ãããwindow.opençã使ã£ã¦æ°ãã«ã¦ã£ã³ãã¦ãéããã¨ãã§ããããã«ãªãããã®ã¨ããexample.jpã«æªæããã以ä¸ã®ãããªã³ã¼ããå«ã¾ãã¦ããã¨ããã if( typeof require === "undefined" ) window.open( 'http://example.jp/', '', 'nodeIntegration=1'); else require( "chi
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}