Description
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_confirm
https://electronjs.org/releases#1.8.2-beta.5
Patch, Third Party Advisory x_refsource_confirm
https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7
Scores
CVSS v3
8.8
EPSS
0.0522
EPSS Percentile
90.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (3)
electronjs/electron
1.8.2 beta.1 (4 CPE variants)
electronjs/electron
< 1.8.1
npm/electron
0 - 1.8.2-beta5npm
Published
Mar 07, 2018
Tracked Since
Feb 18, 2026