In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using both `contextIsolation` and `contextBridge` are affected. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
References
Link | Resource |
---|---|
https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g | Third Party Advisory |
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 | Release Notes Vendor Advisory |
https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g | Third Party Advisory |
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 7.7 |
References | () https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g - Third Party Advisory | |
References | () https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 - Release Notes, Vendor Advisory |
Information
Published : 2020-07-07 00:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4077
Mitre link : CVE-2020-4077
CVE.ORG link : CVE-2020-4077
JSON object : View
Products Affected
electronjs
- electron
CWE