logo

CVE-2020-4075 electron

Package

Manager: npm
Name: electron
Vulnerable Version: =9.0.0 || >=7.0.0 <7.2.4 || >=8.0.0 <8.2.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

EPSS: 0.00264 pctl0.49527

Details

Arbitrary file read via window-open IPC in Electron ### Impact The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open. ### Workarounds Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)

Metadata

Created: 2020-07-07T00:01:13Z
Modified: 2021-01-07T23:48:36Z
Source: MANUAL
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-f9mq-jph6-9mhm
Finding: F123
Auto approve: 1