Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15215
HistoryOct 06, 2020 - 6:00 p.m.

CVE-2020-15215 Context isolation bypass in Electron

2020-10-0618:00:17
CWE-693
CWE-668
GitHub_M
www.cve.org
1
cve-2020-15215
electron
context isolation

CVSS3

5.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

39.5%

Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both contextIsolation and sandbox: true are affected. Apps using both contextIsolation and nodeIntegrationInSubFrames: true are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.

CNA Affected

[
  {
    "product": "electron",
    "vendor": "electron",
    "versions": [
      {
        "status": "affected",
        "version": ">= 8.0.0-beta.0, < 8.5.2"
      },
      {
        "status": "affected",
        "version": ">= 9.0.0-beta.0, < 9.3.1"
      },
      {
        "status": "affected",
        "version": ">= 10.0.0-beta.0, < 10.1.2"
      },
      {
        "status": "affected",
        "version": ">= 11.0.0-beta.0, < 11.0.0-beta.6"
      }
    ]
  }
]

CVSS3

5.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

39.5%

Related for CVELIST:CVE-2020-15215