8.5

CVE-2023-29198

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps using `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. This issue is only exploitable if an API exposed to the main world via `contextBridge` can return an object or array that contains a javascript object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`. The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are supported. This issue has been fixed in versions `25.0.0-alpha.2`, `24.0.1`, `23.2.3`, and `22.3.6`.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ElectronjsElectron SwPlatformnode.js Version < 22.3.6
ElectronjsElectron SwPlatformnode.js Version >= 23.0.0 < 23.2.3
ElectronjsElectron Version24.0.0 Update- SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha1 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha2 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha3 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha4 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha5 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha6 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatealpha7 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta1 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta2 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta3 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta4 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta5 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta6 SwPlatformnode.js
ElectronjsElectron Version24.0.0 Updatebeta7 SwPlatformnode.js
ElectronjsElectron Version25.0.0 Updatealpha1 SwPlatformnode.js
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.351
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.5 1.8 6
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
security-advisories@github.com 6 1.8 3.7
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
CWE-754 Improper Check for Unusual or Exceptional Conditions

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.