Логотип exploitDog
bind:CVE-2021-39184
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-39184

Количество 4

Количество 4

nvd логотип

CVE-2021-39184

больше 4 лет назад

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2021-39184

больше 4 лет назад

Electron is a framework for writing cross-platform desktop application ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-mpjm-v997-c4h4

больше 4 лет назад

Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2022-05149

больше 4 лет назад

Уязвимость функции createThumbnailFromPath программной платформы для создания приложений Electron, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-39184

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-39184

Electron is a framework for writing cross-platform desktop application ...

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-mpjm-v997-c4h4

Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
fstec логотип
BDU:2022-05149

Уязвимость функции createThumbnailFromPath программной платформы для создания приложений Electron, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 8.6
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу