Search for vulnerabilities
Vulnerability details: VCID-5tdc-tq4y-aaas
Vulnerability ID VCID-5tdc-tq4y-aaas
Aliases CVE-2018-1000136
GHSA-8xwg-wv7v-4vqp
Summary Code Execution by Re-enabling Node.js integration Electron contains an improper handling of values vulnerability in Webviews that can result in remote code execution. .
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000136.json
epss 0.00976 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.00976 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.00976 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.00976 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01012 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.01856 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.02214 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.02214 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.02214 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.02214 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.02214 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
epss 0.06152 https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1560094
cvssv3.1 8.1 https://electronjs.org/blog/webview-fix
generic_textual HIGH https://electronjs.org/blog/webview-fix
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-8xwg-wv7v-4vqp
cvssv3.1 8.8 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 8.1 https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043
generic_textual HIGH https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043
cvssv3.1 8.1 https://github.com/electron/electron/pull/12271
generic_textual HIGH https://github.com/electron/electron/pull/12271
cvssv3.1 8.1 https://github.com/electron/electron/pull/12292
generic_textual HIGH https://github.com/electron/electron/pull/12292
cvssv3.1 8.1 https://github.com/electron/electron/pull/12294
generic_textual HIGH https://github.com/electron/electron/pull/12294
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2018-1000136
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2018-1000136
cvssv3.1 8.1 https://www.electronjs.org/blog/webview-fix
generic_textual HIGH https://www.electronjs.org/blog/webview-fix
cvssv3.1 8.1 https://www.npmjs.com/advisories/574
generic_textual HIGH https://www.npmjs.com/advisories/574
cvssv3.1 8.1 https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass
generic_textual HIGH https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000136.json
https://api.first.org/data/v1/epss?cve=CVE-2018-1000136
https://electronjs.org/blog/webview-fix
https://github.com/electron/electron
https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043
https://github.com/electron/electron/pull/12271
https://github.com/electron/electron/pull/12292
https://github.com/electron/electron/pull/12294
https://www.electronjs.org/blog/webview-fix
https://www.npmjs.com/advisories/574
https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass
https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/
1560094 https://bugzilla.redhat.com/show_bug.cgi?id=1560094
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:2.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:2.0.0:beta4:*:*:*:*:*:*
CVE-2018-1000136 https://nvd.nist.gov/vuln/detail/CVE-2018-1000136
GHSA-8xwg-wv7v-4vqp https://github.com/advisories/GHSA-8xwg-wv7v-4vqp
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000136.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://electronjs.org/blog/webview-fix
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/pull/12271
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/pull/12292
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/pull/12294
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000136
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000136
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.electronjs.org/blog/webview-fix
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.npmjs.com/advisories/574
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.83226
EPSS Score 0.00976
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.