CVE-2022-21718
22.03.2022, 17:15
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` allows renderers to obtain access to a bluetooth device via the web bluetooth API if the app has not configured a custom `select-bluetooth-device` event handler. This has been patched and Electron versions `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` contain the fix. Code from the GitHub Security Advisory can be added to the app to work around the issue.Enginsight
Vendor | Product | Version |
---|---|---|
electronjs | electron | 𝑥 < 13.6.6 |
electronjs | electron | 14.0.0 ≤ 𝑥 < 14.2.4 |
electronjs | electron | 15.0.0 ≤ 𝑥 < 15.3.5 |
electronjs | electron | 16.0.0 ≤ 𝑥 < 16.0.6 |
electronjs | electron | 17.0.0:alpha1 |
electronjs | electron | 17.0.0:alpha2 |
electronjs | electron | 17.0.0:alpha3 |
electronjs | electron | 17.0.0:alpha4 |
electronjs | electron | 17.0.0:alpha5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-668 - Exposure of Resource to Wrong SphereThe product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
- CWE-862 - Missing AuthorizationThe software does not perform an authorization check when an actor attempts to access a resource or perform an action.
References