|
|||
Rule General Information |
---|
Release Date: | 2018-05-08 | |
Rule Name: | Electron setAsDefaultProtocolClient Command Injection Vulnerability -2 (CVE-2018-1000006) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows | |
Reference: | SecurityFocusBID:102796 https://electronjs.org/blog/protocol-handler-fix https://github.com/electron/electron/releases/tag/v1.8.2-beta.4 ExploitDB:43899 ExploitDB:44357 |
|
Solutions |
---|
Upgrade to version 1.8.2-beta.4, 1.7.11 or 1.6.16 to solve the problem. |