CVE-2021-39184
Description
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
CWE
- CWE-668 — CWE-668: Exposure of Resource to Wrong Sphere
Affected
- electron / electron — v=< 11.5.0 [affected]; v=>= 12.0.0, < 12.1.0 [affected]; v=>= 13.0.0, < 13.3.0 [affected]
CVSS
- 3.1 score=6.8 severity=MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
References
- https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 x_refsource_CONFIRM
- https://github.com/electron/electron/pull/30728 x_refsource_MISC
Source
cvelistV5-main/cves/2021/39xxx/CVE-2021-39184.json