First published: Tue Aug 03 2021(Updated: )
Poddycast is a podcast app made with Electron. Prior to version 0.8.1, an attacker can create a podcast or episode with malicious characters and execute commands on the client machine. The application does not clean the HTML characters of the podcast information obtained from the Feed, which allows the injection of HTML and JS code (cross-site scripting). Being an application made in electron, cross-site scripting can be scaled to remote code execution, making it possible to execute commands on the machine where the application is running. The vulnerability is patched in Poddycast version 0.8.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Electronjs Poddycast | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32772 is a vulnerability in Poddycast, a podcast app made with Electron, where an attacker can execute commands on the client machine by creating a podcast or episode with malicious characters in the Feed.
CVE-2021-32772 has a severity rating of 8.8 (high).
CVE-2021-32772 affects Poddycast version 0.8.0 and prior versions.
An attacker can exploit CVE-2021-32772 by creating a podcast or episode with malicious characters in the Feed, which allows them to execute commands on the client machine.
Yes, the fix for CVE-2021-32772 is to update to Poddycast version 0.8.1 or later.