9

CVE-2020-4076

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using contextIsolation are affected. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron Version >= 7.0.0 < 7.2.4
ElectronjsElectron Version >= 8.0.0 < 8.2.4
ElectronjsElectron Version9.0.0 Update-
ElectronjsElectron Version9.0.0 Updatebeta1
ElectronjsElectron Version9.0.0 Updatebeta10
ElectronjsElectron Version9.0.0 Updatebeta11
ElectronjsElectron Version9.0.0 Updatebeta12
ElectronjsElectron Version9.0.0 Updatebeta13
ElectronjsElectron Version9.0.0 Updatebeta14
ElectronjsElectron Version9.0.0 Updatebeta15
ElectronjsElectron Version9.0.0 Updatebeta16
ElectronjsElectron Version9.0.0 Updatebeta17
ElectronjsElectron Version9.0.0 Updatebeta18
ElectronjsElectron Version9.0.0 Updatebeta19
ElectronjsElectron Version9.0.0 Updatebeta2
ElectronjsElectron Version9.0.0 Updatebeta20
ElectronjsElectron Version9.0.0 Updatebeta3
ElectronjsElectron Version9.0.0 Updatebeta4
ElectronjsElectron Version9.0.0 Updatebeta5
ElectronjsElectron Version9.0.0 Updatebeta6
ElectronjsElectron Version9.0.0 Updatebeta7
ElectronjsElectron Version9.0.0 Updatebeta8
ElectronjsElectron Version9.0.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.197
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9 2.5 5.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:P/I:P/A:N
security-advisories@github.com 7.8 1.4 5.8
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CWE-501 Trust Boundary Violation

The product mixes trusted and untrusted data in the same data structure or structured message.