Описание
Context isolation bypass in Electron
Impact
Apps using both contextIsolation and sandbox: true are affected.
Apps using both contextIsolation and nativeWindowOpen: true are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
Fixed Versions
11.0.0-beta.610.1.29.3.18.5.2
For more information
If you have any questions or comments about this advisory:
- Email us at security@electronjs.org
Пакеты
electron
>= 8.0.0-beta.0, < 8.5.2
8.5.2
electron
>= 9.0.0-beta.0, < 9.3.1
9.3.1
electron
>= 10.0.0-beta.0, < 10.1.2
10.1.2
electron
>= 11.0.0-beta.0, <= 11.0.0-beta.5
11.0.0-beta.6
Связанные уязвимости
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vuln ...