7.2
CVE-2022-29257
- EPSS 0.45%
- Veröffentlicht 13.06.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:58:49
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. This kind of attack would require significant privileges in a potential victim's own auto updating infrastructure and the ease of that attack entirely depends on the potential victim's infrastructure security. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. There are no known workarounds.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Electronjs ≫ Electron Version < 15.5.0
Electronjs ≫ Electron Version >= 16.0.1 < 16.2.0
Electronjs ≫ Electron Version >= 17.0.1 < 17.2.0
Electronjs ≫ Electron Version16.0.0 Updatebeta1
Electronjs ≫ Electron Version16.0.0 Updatebeta2
Electronjs ≫ Electron Version16.0.0 Updatebeta3
Electronjs ≫ Electron Version16.0.0 Updatebeta4
Electronjs ≫ Electron Version16.0.0 Updatebeta5
Electronjs ≫ Electron Version16.0.0 Updatebeta6
Electronjs ≫ Electron Version16.0.0 Updatebeta7
Electronjs ≫ Electron Version16.0.0 Updatebeta8
Electronjs ≫ Electron Version16.0.0 Updatebeta9
Electronjs ≫ Electron Version17.0.0 Updatebeta1
Electronjs ≫ Electron Version17.0.0 Updatebeta2
Electronjs ≫ Electron Version17.0.0 Updatebeta3
Electronjs ≫ Electron Version17.0.0 Updatebeta4
Electronjs ≫ Electron Version17.0.0 Updatebeta5
Electronjs ≫ Electron Version17.0.0 Updatebeta6
Electronjs ≫ Electron Version17.0.0 Updatebeta7
Electronjs ≫ Electron Version17.0.0 Updatebeta8
Electronjs ≫ Electron Version17.0.0 Updatebeta9
Electronjs ≫ Electron Version18.0.0 Updatebeta1
Electronjs ≫ Electron Version18.0.0 Updatebeta2
Electronjs ≫ Electron Version18.0.0 Updatebeta3
Electronjs ≫ Electron Version18.0.0 Updatebeta4
Electronjs ≫ Electron Version18.0.0 Updatebeta5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.45% | 0.629 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
| security-advisories@github.com | 6.6 | 0.7 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.