Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 #109

Open
mend-bolt-for-github bot opened this issue Feb 2, 2021 · 2 comments · Fixed by #103, #115, #116, #117 or #128
Open

CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 #109

mend-bolt-for-github bot opened this issue Feb 2, 2021 · 2 comments · Fixed by #103, #115, #116, #117 or #128
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link

mend-bolt-for-github bot commented Feb 2, 2021

CVE-2020-26272 - Medium Severity Vulnerability

Vulnerable Library - electronv12.0.0-nightly.20201005

:electron: Build cross-platform desktop apps with JavaScript, HTML, and CSS

Library home page: https://github.com/electron/electron.git

Found in HEAD commit: 4fc35a18c3a967d9d6e32b851af8115908feeac9

Found in base branch: master

Vulnerable Source Files (1)

/shell/common/gin_helper/event_emitter.cc

Vulnerability Details

The Electron framework lets you write cross-platform desktop applications using JavaScript, HTML and CSS. In affected versions of Electron IPC messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame. If your app uses remote, calls webContents.sendToFrame, or calls event.reply in an IPC message handler then it is impacted by this issue. This has been fixed in versions 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9. There are no workarounds for this issue.

Publish Date: 2021-01-28

URL: CVE-2020-26272

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26272

Release Date: 2021-01-28

Fix Resolution: electron - 9.4.0,10.2.0,11.1.0,12.0.0-beta.9


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Feb 2, 2021
@mend-bolt-for-github
Copy link
Author

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 - autoclosed Oct 13, 2022
Copy link
Author

ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 - autoclosed CVE-2020-26272 (Medium) detected in electronv12.0.0-nightly.20201005 Dec 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment