<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Electerm (&lt; 3.7.16) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/electerm--3.7.16/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 May 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/electerm--3.7.16/feed.xml" rel="self" type="application/rss+xml"/><item><title>Electerm Path Traversal Vulnerability Leads to Arbitrary Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-05-electerm-rce/</link><pubDate>Thu, 09 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-electerm-rce/</guid><description>Electerm versions prior to 3.7.16 are vulnerable to path traversal, leading to arbitrary code execution through unsanitized widget identifiers.</description><content:encoded><![CDATA[<p>Electerm versions before 3.7.16 are susceptible to a critical path traversal vulnerability within the <code>runWidget</code> function located in <code>src/app/widgets/load-widget.js</code>. This function insecurely constructs file paths by concatenating user-supplied widget identifiers without proper sanitization. Successful exploitation of CVE-2026-43940 allows an attacker with JavaScript execution within the renderer process to load and execute arbitrary JavaScript files anywhere on the victim’s filesystem. This results in local code execution with the full privileges of the Electerm process, potentially leading to complete system compromise on Windows 10 and Linux systems. The vulnerability was confirmed on v3.7.9, Win10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial JavaScript execution within Electerm&rsquo;s renderer process, possibly via a malicious plugin or XSS.</li>
<li>The attacker crafts a malicious widget identifier containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The malicious widget identifier is passed to the <code>runWidget</code> function via an asynchronous IPC handler.</li>
<li>The <code>runWidget</code> function concatenates the unsanitized widget identifier into a file path: <code>widget-${widgetId}.js</code>.</li>
<li>The resulting file path includes the path traversal sequences, allowing access to arbitrary files.</li>
<li>The <code>require()</code> function attempts to load and execute the JavaScript file at the attacker-controlled path.</li>
<li>If the path traversal is successful, an arbitrary JavaScript file is executed with Electerm process privileges.</li>
<li>The attacker achieves arbitrary code execution, leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants an attacker local code execution with the privileges of the Electerm process. This enables them to perform actions such as installing malware, stealing sensitive data, or compromising the entire system. The vulnerability affects Electerm users on Windows 10 and Linux systems who are running versions prior to 3.7.16. A successful attack could lead to complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Electerm to version 3.7.16 or later to patch CVE-2026-43940.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Electerm Widget Loading</code> to your SIEM and tune for your environment to detect path traversal attempts.</li>
<li>Enable process creation logging on Windows and Linux systems to enhance visibility and enable the <code>Detect Suspicious Electerm Widget Loading</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>code-execution</category><category>electerm</category></item></channel></rss>