CVE-2020-15096 – electron
Package
Manager: npm
Name: electron
Vulnerable Version: >=0 <6.1.1 || =9.0.0 || >=7.0.0 <7.2.4 || >=8.0.0 <8.2.4
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N
EPSS: 0.00237 pctl0.46708
Details
Context isolation bypass via Promise in Electron ### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` * `6.1.11` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
Metadata
Created: 2020-07-07T00:01:05Z
Modified: 2021-01-07T23:48:19Z
Source: MANUAL
CWE IDs: ["CWE-501"]
Alternative ID: GHSA-6vrv-94jv-crrg
Finding: F089
Auto approve: 1