CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:-:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta10:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta11:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta12:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta13:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta14:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta15:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta16:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta17:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta18:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta19:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta20:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta7:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta8:*:*:*:*:*:*
cpe:2.3:a:electronjs:electron:9.0.0:beta9:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
References () https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg - Third Party Advisory () https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg - Third Party Advisory
References () https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 - Release Notes, Vendor Advisory () https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 - Release Notes, Vendor Advisory

Information

Published : 2020-07-07 00:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15096

Mitre link : CVE-2020-15096

CVE.ORG link : CVE-2020-15096


JSON object : View

Products Affected

electronjs

  • electron
CWE
CWE-501

Trust Boundary Violation

NVD-CWE-Other