You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling event.preventDefault() on all new-window events where the url or options is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
CVE-2020-4075 - High Severity Vulnerability
Vulnerable Library - electron-0.4.1.tgz
A simple command-line interface framework for node.js.
Library home page: https://registry.npmjs.org/electron/-/electron-0.4.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/electron/package.json
Dependency Hierarchy:
Found in HEAD commit: 3103722a2c09e9dcab37b1369a88b2bdf496cbdd
Found in base branch: main
Vulnerability Details
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling
event.preventDefault()
on all new-window events where theurl
oroptions
is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.Publish Date: 2020-07-07
URL: CVE-2020-4075
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-f9mq-jph6-9mhm
Release Date: 2020-07-13
Fix Resolution: 7.2.4,8.2.4,9.0.0-beta.21
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: