Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mpjm-v997-c4h4

Опубликовано: 12 окт. 2021
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API

Impact

This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.

All current stable versions of Electron are affected.

Patches

This was fixed with #30728, and the following Electron versions contain the fix:

  • 15.0.0-alpha.10
  • 14.0.0
  • 13.3.0
  • 12.1.0
  • 11.5.0

Workarounds

If your app enables contextIsolation, this vulnerability is significantly more difficult for an attacker to exploit.

Further, if your app does not depend on the createThumbnailFromPath API, then you can simply disable the functionality. In the main process, before the 'ready' event:

delete require('electron').nativeImage.createThumbnailFromPath

For more information

If you have any questions or comments about this advisory, email us at security@electronjs.org.

Пакеты

Наименование

electron

npm
Затронутые версииВерсия исправления

< 11.5.0

11.5.0

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 12.0.0, < 12.1.0

12.1.0

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 13.0.0, < 13.3.0

13.3.0

EPSS

Процентиль: 58%
0.00366
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-668
CWE-862

Связанные уязвимости

CVSS3: 6.8
nvd
больше 4 лет назад

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.

CVSS3: 6.8
debian
больше 4 лет назад

Electron is a framework for writing cross-platform desktop application ...

CVSS3: 8.6
fstec
больше 4 лет назад

Уязвимость функции createThumbnailFromPath программной платформы для создания приложений Electron, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 58%
0.00366
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-668
CWE-862