Run find /Applications -type f -name '*Electron Framework*' -exec \ perl -Mversion=0.77 -nE \ '@safe = map version->parse($_), qw(22.3.24 24.8.3 25.8.1 26.2.1); next unless m{Chrome/[0-9.]+ Electron/([0-9.]+)}; $ver = version->parse($1); if ($ver < (grep int $_->numify >= int $ver->numify, @safe)[0]) { say "vulnerable Electron $ver found in $ARGV"; next }' {} \;
Current behaviour
Vulnerable Electron 13.6.9 found in /Applications/Kap.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework
Expected behaviour
Kap includes a version of Electron with patched libwebp
macOS version: ProductName: macOS ProductVersion: 13.6 BuildVersion: 22G120
Kap version: 3.6.0
Steps to reproduce
Source
Run
find /Applications -type f -name '*Electron Framework*' -exec \ perl -Mversion=0.77 -nE \ '@safe = map version->parse($_), qw(22.3.24 24.8.3 25.8.1 26.2.1); next unless m{Chrome/[0-9.]+ Electron/([0-9.]+)}; $ver = version->parse($1); if ($ver < (grep int $_->numify >= int $ver->numify, @safe)[0]) { say "vulnerable Electron $ver found in $ARGV"; next }' {} \;
Current behaviour
Vulnerable Electron 13.6.9 found in /Applications/Kap.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework
Expected behaviour
Kap includes a version of Electron with patched libwebp