CVE-2020-4076 – electron
Package
Manager: npm
Name: electron
Vulnerable Version: =9.0.0 || >=7.0.0 <7.2.4 || >=8.0.0 <8.2.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00075 pctl0.23287
Details
Context isolation bypass via leaked cross-context objects in Electron ### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### Non-Impacted Versions * `9.0.0-beta.*` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
Metadata
Created: 2020-07-07T00:01:07Z
Modified: 2021-01-07T23:48:11Z
Source: MANUAL
CWE IDs: ["CWE-501"]
Alternative ID: GHSA-m93v-9qjc-3g79
Finding: F089
Auto approve: 1