CVE-2021-39184

CVSS V2 Medium 5 CVSS V3 High 8.6
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
Overview
  • CVE ID
  • CVE-2021-39184
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-10-12T19:15:07
  • Last Modified Date
  • 2022-08-05T10:49:48
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 10.1.0 11.5.0
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 12.0.0 12.1.0
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 13.0.0 13.3.0
cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta20:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta21:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta22:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta23:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta24:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta25:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:14.0.0:beta9:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha1:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha2:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha3:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha4:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha5:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha6:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha7:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha8:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:15.0.0:alpha9:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • CHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 8.6
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 4
References
Reference URL Reference Tags
https://github.com/electron/electron/pull/30728 Third Party Advisory
https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 Mitigation Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:50:16 Added to TrackCVE
2022-12-05 12:16:27 2021-10-12T19:15Z 2021-10-12T19:15:07 CVE Published Date updated
2022-12-05 12:16:27 2022-08-05T10:49:48 CVE Modified Date updated
2022-12-05 12:16:27 Analyzed Vulnerability Status updated