An issue in Postman through 10.22 on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
There is a tool designed to automate the process of searching for vulnerabilities in electron: https://github.com/r3ggi/electroniz3r
With this tool, we can check if the App is Vulnerable:
![image](https://private-user-images.githubusercontent.com/83291215/299681778-d2465158-af23-478b-b975-25c1f2bc90ed.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk0NDQxNTgsIm5iZiI6MTczOTQ0Mzg1OCwicGF0aCI6Ii84MzI5MTIxNS8yOTk2ODE3NzgtZDI0NjUxNTgtYWYyMy00NzhiLWI5NzUtMjVjMWYyYmM5MGVkLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNTAyMTMlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjUwMjEzVDEwNTA1OFomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWU2YjhhN2NhMWM3ZjY3YTBhMzUzMzRlNTY1M2Y1OTAyYzk4NjNhMGE2MzA3N2EwODk5YmZmMTZlNDk5OWY3YWEmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0In0.sR2V3Vf88zt_l1NzNPBCMxlLOV7fBdCmQohYBNVTPus)
After validation, we can inject our code, and get a shell
![image](https://private-user-images.githubusercontent.com/83291215/299682028-cd658b45-7fdd-4e12-bf75-61a8efb2ff85.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk0NDQxNTgsIm5iZiI6MTczOTQ0Mzg1OCwicGF0aCI6Ii84MzI5MTIxNS8yOTk2ODIwMjgtY2Q2NThiNDUtN2ZkZC00ZTEyLWJmNzUtNjFhOGVmYjJmZjg1LnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNTAyMTMlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjUwMjEzVDEwNTA1OFomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWY3OWRlZTk3NTM1NzllYTM1ZDQ5NDZhMzJiMzRmNDRhZjJmZDAyN2M1NjNiODgzNzg2ZjcwZjY1MjIxZTU2ODgmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0In0.tvWMv1reQxxexZSPliFret-DXmEO74juiOcrUyj1VcQ)
Enjoy Your Shell :)