Description
electerm is an open-sourced terminal/ssh/sftp/telnet/serialport/RDP/VNC/Spice/ftp client. From versions 3.0.6 to before 3.8.15, electerm is vulnerable to arbitrary local code execution via deep links, CLI --opts, or crafted shortcuts. Exploit requires clicking a crafted electerm://... link or opening a crafted shortcut/command that launches electerm with attacker-controlled opts. This issue has been patched in version 3.8.15.
Problem types
CWE-20: Improper Input Validation
CWE-94: Improper Control of Generation of Code ('Code Injection')
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Product status
References
github.com/...ecterm/security/advisories/GHSA-mpm8-cx2p-626q
github.com/...ommit/8a6a17951e96d715f5a231532bbd8303fe208700
github.com/...ommit/a79e06f4a1f0ac6376c3d2411ef4690fa0377742
github.com/electerm/electerm/releases/tag/v3.8.15