GHSA-m93v-9qjc-3g79

Suggest an improvement
Source
https://github.com/advisories/GHSA-m93v-9qjc-3g79
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-m93v-9qjc-3g79/GHSA-m93v-9qjc-3g79.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m93v-9qjc-3g79
Aliases
Related
Published
2020-07-07T00:01:07Z
Modified
2023-11-08T04:03:50.822165Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Context isolation bypass via leaked cross-context objects in Electron
Details

Impact

Apps using contextIsolation are affected.

This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.

Workarounds

There are no app-side workarounds, you must update your Electron version to be protected.

Fixed Versions

  • 9.0.0-beta.21
  • 8.2.4
  • 7.2.4

Non-Impacted Versions

  • 9.0.0-beta.*

For more information

If you have any questions or comments about this advisory: * Email us at security@electronjs.org

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-501"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2020-07-06T23:55:29Z",
    "nvd_published_at": null
}
References

Affected packages

npm / electron

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.2.4

npm / electron

Package

Affected ranges

Type
SEMVER
Events
Introduced
8.0.0
Fixed
8.2.4