First published: Wed Mar 07 2018(Updated: )
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Electronjs Electron | <=1.8.1 | |
Electronjs Electron | =1.8.2-beta.1 | |
Electronjs Electron | =1.8.2-beta.2 | |
Electronjs Electron | =1.8.2-beta.3 | |
Electronjs Electron | =1.8.2-beta.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000118 is a Command Injection vulnerability in Github Electron version Electron 1.8.2-beta.4 and earlier, which can result in command execution.
The Command Injection vulnerability in Electron can be exploited when the victim opens an Electron protocol handler in their browser.
CVE-2018-1000118 has a severity rating of 8.8, which is classified as critical.
Electron versions 1.8.2-beta.4 and earlier are affected by CVE-2018-1000118.
To fix the Command Injection vulnerability in Electron, update to version 1.8.2-beta.5 or later.