// For flags

CVE-2018-1000118

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.

Github Electron en su versión Electron 1.8.2-beta.4 y anteriores, contiene una vulnerabilidad de inyección de comandos en el manipulador de protocolos que puede resultar en la ejecución de comandos. El ataque parece ser explotable cuando una víctima abre un manipulador de protocolo electron en su navegador. La vulnerabilidad parece haber sido solucionada en Electron 1.8.2-beta.5. El problema se debe a una solución incompleta para CVE-2018-1000006; específicamente la lista negra empleada no era sensible a mayúsculas, lo que permite que un atacante pueda omitirla.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-03-07 CVE Reserved
  • 2018-03-07 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Electronjs
Search vendor "Electronjs"
Electron
Search vendor "Electronjs" for product "Electron"
<= 1.8.1
Search vendor "Electronjs" for product "Electron" and version " <= 1.8.1"
-
Affected
Electronjs
Search vendor "Electronjs"
Electron
Search vendor "Electronjs" for product "Electron"
1.8.2
Search vendor "Electronjs" for product "Electron" and version "1.8.2"
beta.1
Affected
Electronjs
Search vendor "Electronjs"
Electron
Search vendor "Electronjs" for product "Electron"
1.8.2
Search vendor "Electronjs" for product "Electron" and version "1.8.2"
beta.2
Affected
Electronjs
Search vendor "Electronjs"
Electron
Search vendor "Electronjs" for product "Electron"
1.8.2
Search vendor "Electronjs" for product "Electron" and version "1.8.2"
beta.3
Affected
Electronjs
Search vendor "Electronjs"
Electron
Search vendor "Electronjs" for product "Electron"
1.8.2
Search vendor "Electronjs" for product "Electron" and version "1.8.2"
beta.4
Affected