CVE-2018-1000006
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
24/01/2018
Last modified:
07/11/2023
Description
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:atom:electron:1.8.2:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:atom:electron:1.8.2:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:atom:electron:1.8.2:beta3:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:atom:electron:*:*:*:*:*:*:*:* | 1.7.10 (including) | |
| cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:atom:electron:*:*:*:*:*:*:*:* | 1.6.15 (including) | |
| cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/102796
- https://electronjs.org/blog/protocol-handler-fix
- https://github.com/electron/electron/releases/tag/v1.8.2-beta.4
- https://medium.com/%40Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374
- https://www.exploit-db.com/exploits/43899/
- https://www.exploit-db.com/exploits/44357/



