CVE-2018-1000006
HIGHAtom Electron < 1.7.10 - OS Command Injection
Title source: ruleDescription
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/44357
metasploit
WORKING POC
MANUAL
by Wflki, Daniel Teixeira · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/exodus.rb
References (6)
Scores
CVSS v3
8.8
EPSS
0.9232
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (3)
atom/electron
1.8.2 beta1 (3 CPE variants)
atom/electron
< 1.7.10
npm/electron
1.7.0 - 1.7.11npm
Published
Jan 24, 2018
Tracked Since
Feb 18, 2026