CVE-2020-4075

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
GitHub_MCNA
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
VendorProductVersion
electronjselectron
7.0.0 ≤
𝑥
< 7.2.4
electronjselectron
8.0.0 ≤
𝑥
< 8.2.4
electronjselectron
9.0.0
electronjselectron
9.0.0:beta1
electronjselectron
9.0.0:beta10
electronjselectron
9.0.0:beta11
electronjselectron
9.0.0:beta12
electronjselectron
9.0.0:beta13
electronjselectron
9.0.0:beta14
electronjselectron
9.0.0:beta15
electronjselectron
9.0.0:beta16
electronjselectron
9.0.0:beta17
electronjselectron
9.0.0:beta18
electronjselectron
9.0.0:beta19
electronjselectron
9.0.0:beta2
electronjselectron
9.0.0:beta20
electronjselectron
9.0.0:beta3
electronjselectron
9.0.0:beta4
electronjselectron
9.0.0:beta5
electronjselectron
9.0.0:beta6
electronjselectron
9.0.0:beta7
electronjselectron
9.0.0:beta8
electronjselectron
9.0.0:beta9
𝑥
= Vulnerable software versions