Details Published:
This vulnerability was addressed through infrastructure changes on the ToDesktop platform. No action is required from customers.
The fix was deployed on 2024-10-03 and all ToDesktop for Electron users are automatically protected.
On October 2nd 2024, a security researcher (T/A xyz3va) reported that she was able to gain access to ToDesktop’s Firebase Service Admin Account.
We have reviewed logs and inspected app bundles. No malicious usage was detected. There were no malicious builds or releases of applications from the ToDesktop platform.
We promptly patched the vulnerability and rotated all keys. In addition to patching the vulnerability, we engaged a third-party cybersecurity company, Doyensec, to conduct an independent audit of our platform and build pipeline.
This vulnerability occurred because the build container had broader permissions than necessary, allowing a postinstall script in an application’s package.json to retrieve Firebase credentials. The vulnerability allowed remote attackers to execute arbitrary commands on the build server (e.g., read secrets from the desktopify config.prod.json file), and consequently could have been used to deploy updates to any app.
Had this vulnerability not been identified and responsibly disclosed, a malicious actor could have potentially caused significant harm. In the worst case, this would have allowed an attacker to access the ToDesktop database, user accounts, and deploy unauthorized updates to applications.
All timestamps are in Coordinated Universal Time (UTC).
| Date and Time | Event |
|---|---|
| October 2nd, 2024 6:36pm–6:58pm | The researcher reported the vulnerability, and we acknowledged and confirmed it. |
| October 2nd, 2024 9:00pm | Rotated all affected credentials. |
| October 2nd, 2024 10:00pm | Conducted a preliminary review of logs and investigated recent releases, with no immediate signs of unauthorized access. |
| October 3rd, 2024 8:13pm | Deployed a patch for the vulnerability to production. |
| October 5th, 2024 12:17pm | Completed review of the logs. Confirmed all identified activity was from the researcher (verified by IP Address and user agent). |
| January 21st, 2025 | Third-party security audit with Doyensec completed. |
| February 25th, 2025 | Subsequent retest by Doyensec completed. |
| March 1st, 2025 | Public disclosure. |
Security audits and testing:
Access control and authentication:
Infrastructure and tooling: