Description
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
Remediation
References
https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7
https://electronjs.org/releases#1.8.2-beta.5
Related Vulnerabilities
CVE-2020-14340 Vulnerability in maven package org.jboss.xnio:xnio-nio
CVE-2020-15119 Vulnerability in maven package org.webjars.bower:auth0-lock
CVE-2020-7788 Vulnerability in maven package org.webjars.bowergithub.npm:ini
CVE-2022-25883 Vulnerability in maven package org.webjars.npm:semver
CVE-2021-31409 Vulnerability in maven package com.vaadin:vaadin-compatibility-server