Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. electron
  4. ›
  5. CVE-2021-39184

CVE-2021-39184: Exposure of Resource to Wrong Sphere

October 12, 2021 (updated August 5, 2022)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability allows a sandboxed renderer to request a thumbnail image of an arbitrary file on the user’s system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. all contain a fix for the vulnerability. Two workarounds aside from upgrading are available. One may make the vulnerability significantly more difficult for an attacker to exploit by enabling contextIsolation in one’s app. One may also disable the functionality of the createThumbnailFromPath API if one does not need it.

References

  • nvd.nist.gov/vuln/detail/CVE-2021-39184

Code Behaviors & Features

Detect and mitigate CVE-2021-39184 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 10.1.0 before 11.5.0, all versions starting from 12.0.0 before 12.1.0, all versions starting from 13.0.0 before 13.3.0, all versions starting from 14.0.0 up to 15.0.0

Fixed versions

  • 11.5.0
  • 12.1.0
  • 13.3.0
  • 15.1.0

Solution

Upgrade to versions 11.5.0, 12.1.0, 13.3.0, 15.1.0 or above.

Impact 8.6 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-862: Missing Authorization

Source file

npm/electron/CVE-2021-39184.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:20 +0000.