CVE-2017-12581
Summary
| CVE | CVE-2017-12581 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-08-06 02:29:00 UTC |
| Updated | 2017-08-14 12:04:00 UTC |
| Description | GitHub Electron before 1.6.8 allows remote command execution because of a nodeIntegration bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a chrome-devtools://devtools/bundled/inspector.html window could be used to eval a Node.js child_process.execFile API call. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| doyensec.com/resources/us-17-Carettoni-Electronegativity-A-Study-Of-Electr... | MISC | doyensec.com | Exploit, Technical Description, Third Party Advisory |
| Modern Alchemy: Turning XSS into RCE · Doyensec's Blog | MISC | blog.doyensec.com | Exploit, Technical Description, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 995645 NodeJs (Npm) Security Update for electron (GHSA-7fv9-m79r-j9x8)