Описание
Context isolation bypass via leaked cross-context objects in Electron
Impact
Apps using contextIsolation are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
Fixed Versions
9.0.0-beta.218.2.47.2.4
Non-Impacted Versions
9.0.0-beta.*
For more information
If you have any questions or comments about this advisory:
- Email us at security@electronjs.org
Пакеты
electron
< 7.2.4
7.2.4
electron
>= 8.0.0, < 8.2.4
8.2.4
Связанные уязвимости
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using contextIsolation are affected. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a ...