News for Admins
Tech News
Electron App Vulnerable to Recode Code Execution Vulnerability
Electron, an open source web application platform for creating cross-platform applications, has reported a critical vulnerability that affects Windows users. The remote code execution vulnerability affects several popular apps, including Skype, Slack, and Signal.
"A remote code execution vulnerability has been discovered, affecting Electron apps that use custom protocol handlers. This vulnerability has been assigned the CVE identifier CVE-2018-1000006," wrote Electron in a blog post.
The vulnerability affects every Electron app that runs on Windows and registers as the default handler for a protocol, like MyApp.
According to Electron, "Such apps can be affected regardless of how the protocol is registered, e.g. using native code, the Windows registry, or Electron's app.setAsDefaultProtocolClient API."
Electron has released a new version of the framework that fixes the vulnerability. If you work on Windows and are using Electron to build your apps, please update to the latest version immediately. Linux and Mac OS users are not affected by the vulnerability.
More than 2,000 WordPress Sites Infected by Malware
If you are a WordPress admin, you need to check if your site is infected by the infamous cloudflare.solutions malware.
A few month ago, researchers at Sucuri, a web security company, discovered two infections related to cloudflare.solutions. The company reports that the malware and attack are back.
The malware is a bigger threat to WordPress-powered sites that offer e-commerce services because it is designed to steal payment details. "If hackers manage to steal the admin credentials, they can just log into the site without relying on a flaw to break into the site," wrote The Hacker
...Buy this article as PDF
(incl. VAT)
Buy ADMIN Magazine
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
