Vulnerability Description
electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager >= 5.2.1 <= 6.0.0 || >=6.0.0 <= 6.0.2 defaults to false if not explicitly set to true. This could allow an attacker to perform a man in the middle attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Electron-Packager Project | Electron-Packager | >= 5.2.1, <= 6.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/electron-userland/electron-packager/issues/333Issue TrackingMitigationThird Party Advisory
- https://nodesecurity.io/advisories/104MitigationThird Party Advisory
- https://github.com/electron-userland/electron-packager/issues/333Issue TrackingMitigationThird Party Advisory
- https://nodesecurity.io/advisories/104MitigationThird Party Advisory
FAQ
What is CVE-2016-10534?
CVE-2016-10534 is a vulnerability with a CVSS score of 5.9 (MEDIUM). electron-packager is a command line tool that packages Electron source code into `.app` and `.exe` packages. along with Electron. The `--strict-ssl` command line option in electron-packager >= 5.2.1 <...
How severe is CVE-2016-10534?
CVE-2016-10534 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10534?
Check the references section above for vendor advisories and patch information. Affected products include: Electron-Packager Project Electron-Packager.