paint-brush
Exploiting Electron RCE in Exodus walletby@Wflki
3,283 reads
3,283 reads

Exploiting Electron RCE in Exodus wallet

by Tomas Lažauninkas2mJanuary 25th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

While browsing Twitter I’ve noticed <a href="https://electronjs.org/blog/protocol-handler-fix" target="_blank">ElectronJS remote code execution vulnerability</a> in protocol handler. That sounds severe. As stated in official description, for application to be vulnerable is enough to register itself as default handler for some protocol. I had one application based on Electron installed on my laptop that I was looking into some time ago — <a href="https://www.exodus.io/" target="_blank">Exodus</a> cryptocurrencies wallet. I knew that it registers itself as a handler for <em>exodus://</em> URI scheme.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Exploiting Electron RCE in Exodus wallet
Tomas Lažauninkas HackerNoon profile picture
Tomas Lažauninkas

Tomas Lažauninkas

@Wflki

L O A D I N G
. . . comments & more!

About Author

Tomas Lažauninkas HackerNoon profile picture
Tomas Lažauninkas@Wflki

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite