CVE-2018-1000006

HIGH

Atom Electron < 1.7.10 - OS Command Injection

Title source: rule

Description

GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/44357
exploitdb WORKING POC
by Wflki · htmlremotewindows
https://www.exploit-db.com/exploits/43899
nomisec WORKING POC 40 stars
by CHYbeta · poc
https://github.com/CHYbeta/CVE-2018-1000006-DEMO
metasploit WORKING POC MANUAL
by Wflki, Daniel Teixeira · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/exodus.rb

Scores

CVSS v3 8.8
EPSS 0.9232
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (3)
atom/electron 1.8.2 beta1 (3 CPE variants)
atom/electron < 1.7.10
npm/electron 1.7.0 - 1.7.11npm
Published Jan 24, 2018
Tracked Since Feb 18, 2026