This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
All current stable versions of Electron are affected.
This was fixed with #30728, and the following Electron versions contain the fix:
If your app enables contextIsolation
, this vulnerability is significantly more difficult for an attacker to exploit.
Further, if your app does not depend on the createThumbnailFromPath
API, then you can simply disable the functionality. In the main process, before the 'ready' event:
delete require('electron').nativeImage.createThumbnailFromPath
If you have any questions or comments about this advisory, email us at security@electronjs.org.
{ "nvd_published_at": "2021-10-12T19:15:00Z", "github_reviewed_at": "2021-10-12T18:54:44Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-668", "CWE-862" ] }