First published: Sun Aug 06 2017(Updated: )
Electron before 1.6.8 allows remote command execution because of a `nodeIntegration` bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a `chrome-devtools://devtools/bundled/inspector.html` window could be used to eval a Node.js `child_process.execFile` API call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/electron | <1.6.8 | 1.6.8 |
Electron | <=1.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12581 has a high severity due to its potential for remote command execution.
To fix CVE-2017-12581, upgrade Electron to version 1.6.8 or later.
Electron versions prior to 1.6.8 are affected by CVE-2017-12581.
CVE-2017-12581 is a remote command execution vulnerability due to a nodeIntegration bypass.
Yes, all applications that bundle Electron code equivalent to version 1.6.8 or earlier can be affected by CVE-2017-12581.