CVE-2021-39184

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/10/2021
Last modified:
05/08/2022

Description

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 10.1.0 (including) 11.5.0 (excluding)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 12.0.0 (including) 12.1.0 (excluding)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* 13.0.0 (including) 13.3.0 (excluding)
cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:*