Windows-Only: The NSIS installer makes a system call to open cmd.exe via NSExec in the .nsh
installer script. NSExec by default searches the current directory of where the installer is located before searching PATH
. This means that if an attacker can place a malicious executable file named cmd.exe in the same folder as the installer, the installer will run the malicious file.
Fixed in https://github.com/electron-userland/electron-builder/pull/8059
None, it executes at the installer-level before the app is present on the system, so there's no way to check if it exists in a current installer.
https://cwe.mitre.org/data/definitions/426.html https://cwe.mitre.org/data/definitions/427
{ "github_reviewed_at": "2024-03-04T20:42:45Z", "severity": "HIGH", "cwe_ids": [ "CWE-426", "CWE-427" ], "github_reviewed": true, "nvd_published_at": "2024-03-06T19:15:08Z" }