
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity security vulnerability (GHSA-v3wr-67px-44xg) was identified in the arc-electron package, specifically affecting versions below 0.1.10 of @advanced-rest-client/base npm package. The vulnerability was disclosed on March 2, 2022, and involves execution with unnecessary privileges in the application (GitHub Advisory).
The vulnerability is classified as CWE-250 (Execution with Unnecessary Privileges). When users click on a response header containing a link, the target opens in a new ARC window with the default preload script loaded. This configuration allows embedded scripts in the link target to execute logic with ARC's renderer process privileges (GitHub Advisory).
The vulnerability enables unauthorized access to sensitive system resources through the renderer process. This includes access to the file system, data store (which may contain sensitive information), and additional processes that should be restricted to ARC's use only (GitHub Advisory).
The vulnerability has been patched in version 17.0.9 of the software. As a temporary workaround, users are advised to avoid clicking on any links in the response headers view until they can update to the patched version (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."