Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
References
Link | Resource |
---|---|
https://github.com/electron/electron/pull/30728 | Third Party Advisory |
https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4 | Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-10-12T19:05:11
Updated: 2021-10-12T19:05:11
Reserved: 2021-08-16T00:00:00
Link: CVE-2021-39184
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-10-12T19:15:07.987
Modified: 2022-08-05T10:49:48.757
Link: CVE-2021-39184
JSON object: View
Redhat Information
No data.