CVE-2021-39184
Vulnerability from cvelistv5
Published
2021-10-12 19:05
Modified
2024-08-04 01:58
Summary
Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:58:18.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/electron/electron/pull/30728"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "electron",
          "vendor": "electron",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 11.5.0"
            },
            {
              "status": "affected",
              "version": "\u003e= 12.0.0, \u003c 12.1.0"
            },
            {
              "status": "affected",
              "version": "\u003e= 13.0.0, \u003c 13.3.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a \"thumbnail\" image of an arbitrary file on the user\u0027s system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one\u0027s app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-668",
              "description": "CWE-668: Exposure of Resource to Wrong Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T19:05:11",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/electron/electron/pull/30728"
        }
      ],
      "source": {
        "advisory": "GHSA-mpjm-v997-c4h4",
        "discovery": "UNKNOWN"
      },
      "title": "Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-39184",
          "STATE": "PUBLIC",
          "TITLE": "Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "electron",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 11.5.0"
                          },
                          {
                            "version_value": "\u003e= 12.0.0, \u003c 12.1.0"
                          },
                          {
                            "version_value": "\u003e= 13.0.0, \u003c 13.3.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "electron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a \"thumbnail\" image of an arbitrary file on the user\u0027s system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one\u0027s app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-668: Exposure of Resource to Wrong Sphere"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4",
              "refsource": "CONFIRM",
              "url": "https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4"
            },
            {
              "name": "https://github.com/electron/electron/pull/30728",
              "refsource": "MISC",
              "url": "https://github.com/electron/electron/pull/30728"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-mpjm-v997-c4h4",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-39184",
    "datePublished": "2021-10-12T19:05:11",
    "dateReserved": "2021-08-16T00:00:00",
    "dateUpdated": "2024-08-04T01:58:18.275Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-39184\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-10-12T19:15:07.987\",\"lastModified\":\"2022-08-05T10:49:48.757\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a \\\"thumbnail\\\" image of an arbitrary file on the user\u0027s system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one\u0027s app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.\"},{\"lang\":\"es\",\"value\":\"Electron es un framework para escribir aplicaciones de escritorio multiplataforma usando JavaScript, HTML y CSS. Una vulnerabilidad en las versiones anteriores a 11.5.0, 12.1.0 y 13.3.0, permite que un renderizador en sandbox requiera una imagen \\\"thumbnail\\\" de un archivo arbitrario en el sistema del usuario. La miniatura puede incluir potencialmente partes significativas del archivo original, incluyendo datos textuales en muchos casos. Las versiones 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0 y 11.5.0, contienen una correcci\u00f3n de la vulnerabilidad. Se presentan dos soluciones disponibles aparte de la actualizaci\u00f3n. Uno puede hacer que la vulnerabilidad sea significativamente m\u00e1s dif\u00edcil de explotar para un atacante al habilitar \\\"contextIsolation\\\" en la propia aplicaci\u00f3n. Tambi\u00e9n es posible deshabilitar la funcionalidad de la API \\\"createThumbnailFromPath\\\" si no es necesaria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.2,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-668\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndExcluding\":\"11.5.0\",\"matchCriteriaId\":\"7ED24D03-59B2-4E91-B807-7BD1B09D8389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.1.0\",\"matchCriteriaId\":\"3DE5DF76-68D8-4E5F-8916-6F3F7140E7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0.0\",\"versionEndExcluding\":\"13.3.0\",\"matchCriteriaId\":\"56BC24C9-C297-4D02-8601-B8F37449350B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3152223A-E182-45F8-87EC-264B2DDD4B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2007F6E-ECCB-4A7B-A4B6-24104A8D8AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"7134F6E7-427F-4187-B94B-1B1C1B1FE73B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"82F84AAE-AD55-4565-9D41-DCAFCAA5D0AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63A3C29-E6F0-41A3-838F-F7BFA893CF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD814A9-5A50-49EF-9053-B36B127D7AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B813DB-A89D-48AD-A3F0-3D68AB7A087F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"C192B552-BE06-480C-86A7-59CC2291EB27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFDC76F2-A8CA-4063-A8DA-F63C04D70760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:*\",\"matchCriteriaId\":\"98A43F4A-ED19-47D4-B4F9-7BC769E2F7F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB7F3FF-CDFF-4E23-B2D1-EF0AC8C75D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C057D-8574-44DB-B8A4-8ECD9BBA6B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta20:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF66D1F-77B6-4A5E-AD93-921FF2FC3309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta21:*:*:*:*:*:*\",\"matchCriteriaId\":\"871B25E4-F705-491D-842E-3D79B9351DAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta22:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A59303D-7105-44E5-A91F-CBEF2F672F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta23:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E8CF66-C123-4A63-BE8D-90321FF8A348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta24:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE680F3-CB4A-4298-A4B1-FDDE6BAB0896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta25:*:*:*:*:*:*\",\"matchCriteriaId\":\"65DE71FB-0390-4D80-982E-D8709CD73573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF035B4-FEF5-4D53-B975-CAF66ACA1860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"88607FE5-5E91-4CD9-831A-2C353779BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAE6B51E-F47B-48F5-8249-C958E85AE708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B43BEC-8941-4587-A7AA-000456568E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"69CBF166-FF15-4E1C-83C1-207C1F67A7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0817340D-82C9-4D79-9FF3-36F13260542D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:14.0.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20755C8-D323-4CF8-ACA0-199081610342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD9A6155-8B6B-4C1B-80CB-A26779559AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84883AD-A2C0-4075-BDB7-AAB8307DC099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"028E4C03-4A98-4311-8A19-825035C8EB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"78FAAB9C-73D0-4DBC-B78F-293D75FDFC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9709716E-896F-430E-9C5F-F898B46256E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"669329B9-EA55-4FEC-8543-A8FA1C0733BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha7:*:*:*:*:*:*\",\"matchCriteriaId\":\"99904BC0-56A9-405C-A4C3-BCE30B840DB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha8:*:*:*:*:*:*\",\"matchCriteriaId\":\"755AE879-ACB3-450A-85B4-095E93CCF77A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:15.0.0:alpha9:*:*:*:*:*:*\",\"matchCriteriaId\":\"37428807-70D6-496C-82A0-2084F2BC2D51\"}]}]}],\"references\":[{\"url\":\"https://github.com/electron/electron/pull/30728\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.