First published: Wed Jan 24 2018(Updated: )
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atom Electron | =1.8.2-beta1 | |
Atom Electron | =1.8.2-beta2 | |
Atom Electron | =1.8.2-beta3 | |
Microsoft Windows 10 | ||
Microsoft Windows 7 | ||
Microsoft Windows Server | ||
Atom Electron | <=1.7.10 | |
Atom Electron | <=1.6.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000006 is classified as a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2018-1000006, upgrade to Electron version 1.8.2-beta.4 or later.
CVE-2018-1000006 affects Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, and 1.6.15 and earlier.
CVE-2018-1000006 primarily impacts Electron applications running on Windows 10, Windows 7, and Windows Server 2008.
CVE-2018-1000006 is a protocol handler vulnerability that can lead to arbitrary command execution when exploited.