Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-56pc-6jqp-xqj8

Опубликовано: 06 окт. 2020
Источник: github
Github: Прошло ревью
CVSS3: 5.6

Описание

Context isolation bypass in Electron

Impact

Apps using both contextIsolation and sandbox: true are affected. Apps using both contextIsolation and nativeWindowOpen: true are affected.

This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.

Workarounds

There are no app-side workarounds, you must update your Electron version to be protected.

Fixed Versions

  • 11.0.0-beta.6
  • 10.1.2
  • 9.3.1
  • 8.5.2

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 8.0.0-beta.0, < 8.5.2

8.5.2

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 9.0.0-beta.0, < 9.3.1

9.3.1

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 10.0.0-beta.0, < 10.1.2

10.1.2

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 11.0.0-beta.0, <= 11.0.0-beta.5

11.0.0-beta.6

EPSS

Процентиль: 51%
0.00282
Низкий

5.6 Medium

CVSS3

Дефекты

CWE-668
CWE-693

Связанные уязвимости

CVSS3: 5.6
nvd
больше 5 лет назад

Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.

CVSS3: 5.6
debian
больше 5 лет назад

Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vuln ...

EPSS

Процентиль: 51%
0.00282
Низкий

5.6 Medium

CVSS3

Дефекты

CWE-668
CWE-693