7.2

CVE-2022-36077

The Electron framework enables writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions prior to 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7, Electron is vulnerable to Exposure of Sensitive Information. When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as `file://some.website.com/`, then in some cases, Windows will connect to that server and attempt NTLM authentication, which can include sending hashed credentials.This issue has been patched in versions: 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7. Users are recommended to upgrade to the latest stable version of Electron. If upgrading isn't possible, this issue can be addressed without upgrading by preventing redirects to file:// URLs in the `WebContents.on('will-redirect')` event, for all WebContents as a workaround.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron SwPlatformnode.js Version < 18.3.7
   MicrosoftWindows Version-
ElectronjsElectron SwPlatformnode.js Version >= 19.0.0 < 19.0.11
   MicrosoftWindows Version-
ElectronjsElectron SwPlatformnode.js Version >= 20.0.0 < 20.0.1
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Update- SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha1 SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha2 SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha3 SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha4 SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha5 SwPlatformnode.js
   MicrosoftWindows Version-
ElectronjsElectron Version21.0.0 Updatealpha6 SwPlatformnode.js
   MicrosoftWindows Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.257
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
security-advisories@github.com 7.2 3.9 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.