8.6

CVE-2021-39184

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron Version >= 10.1.0 < 11.5.0
ElectronjsElectron Version >= 12.0.0 < 12.1.0
ElectronjsElectron Version >= 13.0.0 < 13.3.0
ElectronjsElectron Version14.0.0 Updatebeta1
ElectronjsElectron Version14.0.0 Updatebeta10
ElectronjsElectron Version14.0.0 Updatebeta11
ElectronjsElectron Version14.0.0 Updatebeta12
ElectronjsElectron Version14.0.0 Updatebeta13
ElectronjsElectron Version14.0.0 Updatebeta14
ElectronjsElectron Version14.0.0 Updatebeta15
ElectronjsElectron Version14.0.0 Updatebeta16
ElectronjsElectron Version14.0.0 Updatebeta17
ElectronjsElectron Version14.0.0 Updatebeta18
ElectronjsElectron Version14.0.0 Updatebeta19
ElectronjsElectron Version14.0.0 Updatebeta2
ElectronjsElectron Version14.0.0 Updatebeta20
ElectronjsElectron Version14.0.0 Updatebeta21
ElectronjsElectron Version14.0.0 Updatebeta22
ElectronjsElectron Version14.0.0 Updatebeta23
ElectronjsElectron Version14.0.0 Updatebeta24
ElectronjsElectron Version14.0.0 Updatebeta25
ElectronjsElectron Version14.0.0 Updatebeta3
ElectronjsElectron Version14.0.0 Updatebeta4
ElectronjsElectron Version14.0.0 Updatebeta5
ElectronjsElectron Version14.0.0 Updatebeta6
ElectronjsElectron Version14.0.0 Updatebeta7
ElectronjsElectron Version14.0.0 Updatebeta8
ElectronjsElectron Version14.0.0 Updatebeta9
ElectronjsElectron Version15.0.0 Updatealpha1
ElectronjsElectron Version15.0.0 Updatealpha2
ElectronjsElectron Version15.0.0 Updatealpha3
ElectronjsElectron Version15.0.0 Updatealpha4
ElectronjsElectron Version15.0.0 Updatealpha5
ElectronjsElectron Version15.0.0 Updatealpha6
ElectronjsElectron Version15.0.0 Updatealpha7
ElectronjsElectron Version15.0.0 Updatealpha8
ElectronjsElectron Version15.0.0 Updatealpha9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.37% 0.579
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
security-advisories@github.com 6.8 2.2 4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.

CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.