Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f9mq-jph6-9mhm

Опубликовано: 07 июл. 2020
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

Arbitrary file read via window-open IPC in Electron

Impact

The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.

Workarounds

Ensure you are calling event.preventDefault() on all new-window events where the url or options is not something you expect.

Fixed Versions

  • 9.0.0-beta.21
  • 8.2.4
  • 7.2.4

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

electron

npm
Затронутые версииВерсия исправления

< 7.2.4

7.2.4

Наименование

electron

npm
Затронутые версииВерсия исправления

>= 8.0.0, < 8.2.4

8.2.4

EPSS

Процентиль: 49%
0.00264
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-552

Связанные уязвимости

CVSS3: 6.8
nvd
больше 5 лет назад

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.

CVSS3: 6.8
debian
больше 5 лет назад

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary ...

EPSS

Процентиль: 49%
0.00264
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-552