GitHub Electron before 1.6.8 allows remote command execution because of a nodeIntegration bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a chrome-devtools://devtools/bundled/inspector.html window could be used to eval a Node.js child_process.execFile API call.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2989 GitHub Electron before 1.6.8 allows remote command execution because of a nodeIntegration bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a chrome-devtools://devtools/bundled/inspector.html window could be used to eval a Node.js child_process.execFile API call.
Github GHSA Github GHSA GHSA-7fv9-m79r-j9x8 Electron vulnerable to remote command execution
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T18:43:56.211Z

Reserved: 2017-08-05T00:00:00

Link: CVE-2017-12581

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-08-06T02:29:00.227

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-12581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses