8.8
CVSSv3

CVE-2018-1000006

Published: 24/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 941
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

GitHub Electron versions 1.8.2-beta.3 and previous versions, 1.7.10 and previous versions, 1.6.15 and previous versions has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atom electron 1.8.2

atom electron

Exploits

<!doctype html> <script> windowlocation = 'exodus://aaaaaaaaa" --gpu-launcher="cmd" --aaaaa=' </script> ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::EXE include Msf::Exploit::Powershell include Msf::Exploit::Remote::Http ...

Github Repositories

The Demo for CVE-2018-1000006

CVE-2018-1000006-DEMO The Demo for CVE-2018-1000006 Analysis Electron < v182-beta4 远程命令执行漏洞—【CVE-2018-1000006】 POC 可以直接使用 elec_rce\elec_rce-win32-x64\elec_rceexe 也可以自己打包成exe应用,生成有漏洞的版本应用,以版本178为例: electron-packager /test elec_rce --win --out /elec_rce --arch=x64 --version=

A simple example for a (more reasonably) secure electron application, by enabling the sandbox and forcing communication over IPC.

This repository has not been reviewed for security flaws by external parties, use at your own risk THIS REPOSITORY IS NOT UNDER ACTIVE DEVELOPMENT ANYMORE AND SHOULD ONLY BE USED AS A HISTORICAL RECORD OF MY OWN NOTES PLEASE TAKE A LOOK AT secure-electron-template FOR A MORE ACTIVELY MAINTAINED PROJECT electron-sandbox A simple code example of a sandboxed renderer process w

Recent Articles

Electron patches patch after security researcher bypassed said patch
The Register • Richard Chirgwin • 25 May 2018

January's fix for software toolkit had blacklist flaw, now fixed

In an update last week, the developers of Electron – the toolkit used to craft widely used apps from Skype and Slack to Atom – shipped a patch to their January patch, and now, an infosec researcher has explained why. A remote-code execution vulnerability, CVE-2018-1000006, was found in Windows applications developed using Electron that registered custom protocol handlers. That security hole can be exploited to run arbitrary commands on a Windows PC by making a victim click on a maliciously c...

Skype, Slack, other apps inherit Electron vuln
The Register • Richard Chirgwin • 24 Jan 2018

Devs, check your protocol handling, patch if necessary

Updated If you've built a Windows application on Electron, check to see if it's subject to a just-announced remote code execution vulnerability. Electron is a node.js and Chromium framework that lets developers use Web technologies (JavaScript, HTML and CSS) to build desktop apps. It's widely-used: Skype, Slack, Signal, a Basecamp implementation and a desktop Wordpress app all count themselves as adopters. Slack users should update to version 3.0.3 or better, and the latest version of Skype for ...