CVE-2020-4077
Description
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using both `contextIsolation` and `contextBridge` are affected. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
CWE
- CWE-501 — CWE-501 Trust Boundary Violation
Affected
- electron / electron — v=>= 9.0.0-beta.0, <= 9.0.0-beta.20 [affected]; v=>= 8.0.0, < 8.2.4 [affected]; v=< 7.2.4 [affected]
CVSS
- 3.1 score=7.7 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
References
- https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g x_refsource_CONFIRM
- https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824 x_refsource_MISC
Source
cvelistV5-main/cves/2020/4xxx/CVE-2020-4077.json