8.5
CVE-2023-29198
- EPSS 0.15%
- Veröffentlicht 06.09.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:56:41
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps using `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. This issue is only exploitable if an API exposed to the main world via `contextBridge` can return an object or array that contains a javascript object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`. The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are supported. This issue has been fixed in versions `25.0.0-alpha.2`, `24.0.1`, `23.2.3`, and `22.3.6`.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Electronjs ≫ Electron SwPlatformnode.js Version < 22.3.6
Electronjs ≫ Electron SwPlatformnode.js Version >= 23.0.0 < 23.2.3
Electronjs ≫ Electron Version24.0.0 Update- SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha1 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha2 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha3 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha4 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha5 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha6 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatealpha7 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta1 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta2 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta3 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta4 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta5 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta6 SwPlatformnode.js
Electronjs ≫ Electron Version24.0.0 Updatebeta7 SwPlatformnode.js
Electronjs ≫ Electron Version25.0.0 Updatealpha1 SwPlatformnode.js
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.351 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.5 | 1.8 | 6 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
|
| security-advisories@github.com | 6 | 1.8 | 3.7 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
|
CWE-754 Improper Check for Unusual or Exceptional Conditions
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.