// For flags

CVE-2018-1000006

Google Web Designer URI Parsing Command Injection Remote Code Execution Vulnerability

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.

GitHub Electron en versiones 1.8.2-beta.3 y anteriores, 1.7.10 y anteriores y 1.6.15 y anteriores tiene una vulnerabilidad en el manipulador de protocolos, específicamente en las apps Electron que se ejecutan en Windows 10, 7 o 2008 y que registren manipuladores personalizados de protocolos, que permite que se les pueda engañar para que ejecuten comandos arbitrarios si el usuario hace clic en una URL especialmente manipulada. Esto se ha solucionado en las versiones 1.8.2-beta.4, 1.7.11 y 1.6.16.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Web Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process.

Exodus Wallet (ElectronJS Framework) suffers from a remote code execution vulnerability.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-19 CVE Reserved
  • 2018-01-24 CVE Published
  • 2018-01-25 First Exploit
  • 2024-07-20 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta1
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta1
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta1
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2008
Search vendor "Microsoft" for product "Windows Server 2008"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta2
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta2
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta2
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2008
Search vendor "Microsoft" for product "Windows Server 2008"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta3
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta3
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
1.8.2
Search vendor "Atom" for product "Electron" and version "1.8.2"
beta3
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2008
Search vendor "Microsoft" for product "Windows Server 2008"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.7.10
Search vendor "Atom" for product "Electron" and version " <= 1.7.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.7.10
Search vendor "Atom" for product "Electron" and version " <= 1.7.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.7.10
Search vendor "Atom" for product "Electron" and version " <= 1.7.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2008
Search vendor "Microsoft" for product "Windows Server 2008"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.6.15
Search vendor "Atom" for product "Electron" and version " <= 1.6.15"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.6.15
Search vendor "Atom" for product "Electron" and version " <= 1.6.15"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows 7
Search vendor "Microsoft" for product "Windows 7"
--
Safe
Atom
Search vendor "Atom"
Electron
Search vendor "Atom" for product "Electron"
<= 1.6.15
Search vendor "Atom" for product "Electron" and version " <= 1.6.15"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows Server 2008
Search vendor "Microsoft" for product "Windows Server 2008"
--
Safe