Arbitrary Code Execution Affecting electron package, versions >=1.7.0 <1.7.13 >=1.8.1 <1.8.4 >=2.0.0-beta.1 <2.0.0-beta.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    1.01% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID npm:electron:20180323
  • published 27 Mar 2018
  • disclosed 23 Mar 2018
  • credit Unknown

How to fix?

Upgrade electron to version 1.7.13, 1.8.4, 2.0.0-beta.4 or higher.

Overview

electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It contains an improper handling of values vulnerability in Webviews. This attack appear to be exploitable via an app which allows execution of 3rd party code AND disallows node integration AND has not specified if webview is enabled/disabled.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.1 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High