CVE-2021-39184
CVSS V2 Medium 5
CVSS V3 High 8.6
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
Overview
- CVE ID
- CVE-2021-39184
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-10-12T19:15:07
- Last Modified Date
- 2022-08-05T10:49:48
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* | 1 | OR | 10.1.0 | 11.5.0 |
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* | 1 | OR | 12.0.0 | 12.1.0 |
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* | 1 | OR | 13.0.0 | 13.3.0 |
cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta20:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta21:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta22:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta23:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta24:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta25:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta8:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:14.0.0:beta9:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha8:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:electronjs:electron:15.0.0:alpha9:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- CHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 8.6
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 4
References
Reference URL | Reference Tags |
---|---|
https://github.com/electron/electron/pull/30728 | Third Party Advisory |
https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 | Mitigation Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-39184 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39184 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:50:16 | Added to TrackCVE | |||
2022-12-05 12:16:27 | 2021-10-12T19:15Z | 2021-10-12T19:15:07 | CVE Published Date | updated |
2022-12-05 12:16:27 | 2022-08-05T10:49:48 | CVE Modified Date | updated | |
2022-12-05 12:16:27 | Analyzed | Vulnerability Status | updated |