CVE-2022-21718 – electron
Package
Manager: npm
Name: electron
Vulnerable Version: >=0 <13.6.6 || >=14.0.0 <14.2.4 || >=15.0.0 <15.3.5 || >=16.0.0 <16.0.6 || >=17.0.0-alpha1 <=17.0.0-alpha5
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00887 pctl0.74586
Details
Renderers can obtain access to random bluetooth device without permission in Electron ### Impact This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the attacker would have no way of selecting a specific device. All current stable versions of Electron are affected. ### Patches This has been patched and the following Electron versions contain the fix: * `17.0.0-alpha.6` * `16.0.6` * `15.3.5` * `14.2.4` * `13.6.6` ### Workarounds Adding this code to your app can workaround the issue. ```js app.on('web-contents-created', (event, webContents) => { webContents.on('select-bluetooth-device', (event, devices, callback) => { // Prevent default behavior event.preventDefault(); // Cancel the request callback(''); }); }); ``` For more information If you have any questions or comments about this advisory, email us at security@electronjs.org.
Metadata
Created: 2022-03-22T18:49:36Z
Modified: 2022-03-22T18:49:36Z
Source: MANUAL
CWE IDs: ["CWE-668", "CWE-862"]
Alternative ID: GHSA-3p22-ghq8-v749
Finding: F039
Auto approve: 1