Search for vulnerabilities
Vulnerability details: VCID-437a-3uur-aaas
Vulnerability ID VCID-437a-3uur-aaas
Aliases CVE-2017-12581
GHSA-7fv9-m79r-j9x8
Summary OS Command Injection Recent Electron versions do not have strict Same Origin Policy (SOP) enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.01169 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2017-12581
cvssv3.1 8.1 https://blog.doyensec.com/2017/08/03/electron-framework-security.html
generic_textual HIGH https://blog.doyensec.com/2017/08/03/electron-framework-security.html
cvssv3.1 8.1 https://doyensec.com/resources/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf
generic_textual HIGH https://doyensec.com/resources/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-7fv9-m79r-j9x8
cvssv3.1 8.8 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 8.1 https://github.com/electron/electron/commit/05b6d91bf4c1e0ee65eeef70cd5d1bd1df125644
generic_textual HIGH https://github.com/electron/electron/commit/05b6d91bf4c1e0ee65eeef70cd5d1bd1df125644
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2017-12581
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2017-12581
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://blog.doyensec.com/2017/08/03/electron-framework-security.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://doyensec.com/resources/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/05b6d91bf4c1e0ee65eeef70cd5d1bd1df125644
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2017-12581
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-12581
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.77811
EPSS Score 0.00543
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.