We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-39184

Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API



AssignerGitHub_M
Reserved2021-08-16
Published2021-10-12
Updated2024-08-04

Description

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to 11.5.0, 12.1.0, and 13.3.0 allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. Versions 15.0.0-alpha.10, 14.0.0, 13.3.0, 12.1.0, and 11.5.0 all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.



MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

< 11.5.0
affected

>= 12.0.0, < 12.1.0
affected

>= 13.0.0, < 13.3.0
affected

References

https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4

https://github.com/electron/electron/pull/30728

cve.org CVE-2021-39184

nvd.nist.gov CVE-2021-39184

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.