Search for vulnerabilities
Vulnerability details: VCID-cvgm-5dry-aaaj
Vulnerability ID VCID-cvgm-5dry-aaaj
Aliases CVE-2021-39184
GHSA-mpjm-v997-c4h4
Summary Exposure of Resource to Wrong Sphere Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability allows a sandboxed renderer to request a `thumbnail` image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling `contextIsolation` in one's app. One may also disable the functionality of the `createThumbnailFromPath` API if one does not need it.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00149 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00366 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
epss 0.00729 https://api.first.org/data/v1/epss?cve=CVE-2021-39184
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-mpjm-v997-c4h4
cvssv3.1 8.8 https://github.com/electron/electron
generic_textual HIGH https://github.com/electron/electron
cvssv3.1 6.8 https://github.com/electron/electron/pull/30728
generic_textual MODERATE https://github.com/electron/electron/pull/30728
cvssv3.1 6.8 https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f
generic_textual MODERATE https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f
cvssv3.1 6.8 https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4
generic_textual MODERATE https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-39184
cvssv3 8.6 https://nvd.nist.gov/vuln/detail/CVE-2021-39184
cvssv3.1 8.6 https://nvd.nist.gov/vuln/detail/CVE-2021-39184
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2021-39184
https://github.com/electron/electron
https://github.com/electron/electron/pull/30728
https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f
https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta10:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta11:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta12:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta13:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta14:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta15:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta16:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta17:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta18:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta19:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta20:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta20:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta21:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta21:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta22:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta22:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta23:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta23:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta24:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta24:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta25:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta25:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta7:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta8:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:14.0.0:beta9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:14.0.0:beta9:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha8:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:15.0.0:alpha9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:electronjs:electron:15.0.0:alpha9:*:*:*:*:*:*
CVE-2021-39184 https://nvd.nist.gov/vuln/detail/CVE-2021-39184
GHSA-mpjm-v997-c4h4 https://github.com/advisories/GHSA-mpjm-v997-c4h4
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://github.com/electron/electron/pull/30728
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39184
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39184
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39184
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.51804
EPSS Score 0.00149
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.