Improper Input Validation Affecting org.webjars.npm:electron package, versions [,32.0.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-2395336
  • published6 Feb 2022
  • disclosed11 Jan 2022
  • creditSergei Glazunov

Introduced: 11 Jan 2022

CVE-2021-4098  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.webjars.npm:electron to version 32.0.1 or higher.

Overview

org.webjars.npm:electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Improper Input Validation via Mojo. If the endpoint's task runner does not match the current task runner (or an equivalent main-thread task runner for the ChannelProxy) when executing a message dispatch task for that endpoint, it dispatches it on the wrong sequence.

CVSS Scores

version 3.1