First published: Tue Jul 07 2020(Updated: )
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Electronjs Electron | <6.1.1 | |
Electronjs Electron | >=7.0.0<7.2.4 | |
Electronjs Electron | >=8.0.0<8.2.4 | |
Electronjs Electron | =9.0.0 | |
Electronjs Electron | =9.0.0-beta1 | |
Electronjs Electron | =9.0.0-beta10 | |
Electronjs Electron | =9.0.0-beta11 | |
Electronjs Electron | =9.0.0-beta12 | |
Electronjs Electron | =9.0.0-beta13 | |
Electronjs Electron | =9.0.0-beta14 | |
Electronjs Electron | =9.0.0-beta15 | |
Electronjs Electron | =9.0.0-beta16 | |
Electronjs Electron | =9.0.0-beta17 | |
Electronjs Electron | =9.0.0-beta18 | |
Electronjs Electron | =9.0.0-beta19 | |
Electronjs Electron | =9.0.0-beta2 | |
Electronjs Electron | =9.0.0-beta20 | |
Electronjs Electron | =9.0.0-beta3 | |
Electronjs Electron | =9.0.0-beta4 | |
Electronjs Electron | =9.0.0-beta5 | |
Electronjs Electron | =9.0.0-beta6 | |
Electronjs Electron | =9.0.0-beta7 | |
Electronjs Electron | =9.0.0-beta8 | |
Electronjs Electron | =9.0.0-beta9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15096 is a vulnerability in Electron versions before 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21 that allows code running in the main world context in the renderer to perform privileged actions.
CVE-2020-15096 has a severity rating of 6.8 (Medium).
Electron versions before 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21 are affected.
To fix CVE-2020-15096, update Electron to version 6.1.1 or later, 7.2.4 or later, 8.2.4 or later, or 9.0.0-beta21 or later.
You can find more information about CVE-2020-15096 at the following references: [GitHub Advisory](https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg) and [Electron Release Notes](https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824).