CVE-2020-15096

Name
CVE-2020-15096
Description
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
Third Party Advisory https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* electron >= None < 6.1.1
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* electron >= 7.0.0 < 7.2.4
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:* electron >= 8.0.0 < 8.2.4
cpe:2.3:a:electronjs:electron:9.0.0:-:*:*:*:*:*:* electron == None == 9.0.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status