Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-23623
HistorySep 06, 2023 - 8:16 p.m.

CVE-2023-23623 Content-Secrity-Policy disabling eval not applied consistently in renderers with sandbox disabled in Electron

2023-09-0620:16:10
CWE-670
GitHub_M
github.com
1
cve-2023-23623
electron
content-security-policy
eval
sandbox
security fix
javascript
html
css

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. A Content-Security-Policy that disables eval, specifically setting a script-src directive and not providing unsafe-eval in that directive, is not respected in renderers that have sandbox disabled. i.e. sandbox: false in the webPreferences object. This allows usage of methods like eval() and new Function unexpectedly which can result in an expanded attack surface. This issue only ever affected the 22 and 23 major versions of Electron and has been fixed in the latest versions of those release lines. Specifically, these versions contain the fixes: 22.0.1 and 23.0.0-alpha.2 We recommend all apps upgrade to the latest stable version of Electron. If upgrading isn’t possible, this issue can be addressed without upgrading by enabling sandbox: true on all renderers.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:atom:electron:*:*:*:*:*:*:*:*"
    ],
    "vendor": "atom",
    "product": "electron",
    "versions": [
      {
        "status": "affected",
        "version": "22.0.0_beta.1",
        "lessThan": "22.0.1",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "23.0.0_alpha.1",
        "lessThan": "23.0.0_alpha.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-23623