CVE-2022-29247

CVSS V2 Medium 6.8 CVSS V3 Critical 9.8
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`. The `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access. Rather, it depends on the existing sandbox setting. If an application is sandboxed, then `nodeIntegrationInSubFrames` just gives access to the sandboxed renderer APIs, which include `ipcRenderer`. If the application then additionally exposes IPC messages without IPC `senderFrame` validation that perform privileged actions or return confidential data this access to `ipcRenderer` can in turn compromise your application / user even with the sandbox enabled. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. As a workaround, ensure that all IPC message handlers appropriately validate `senderFrame`.
Overview
  • CVE ID
  • CVE-2022-29247
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-06-13T21:15:07
  • Last Modified Date
  • 2022-06-27T16:55:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 15.5.5
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 16.0.1 16.2.6
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 1 OR 17.0.1 17.2.0
cpe:2.3:a:electronjs:electron:16.0.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:16.0.0:beta9:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:17.0.0:beta9:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:18.0.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:18.0.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:18.0.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:18.0.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:electronjs:electron:18.0.0:beta5:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-06-13 22:00:07 Added to TrackCVE