Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-4075

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-07 Jul, 2020 | 00:05
Updated At-04 Aug, 2024 | 07:52
Rejected At-
Credits

Arbitrary file read via window-open IPC in Electron

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:07 Jul, 2020 | 00:05
Updated At:04 Aug, 2024 | 07:52
Rejected At:
▼CVE Numbering Authority (CNA)
Arbitrary file read via window-open IPC in Electron

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.

Affected Products
Vendor
Electron Userlandelectron
Product
electron
Versions
Affected
  • >= 9.0.0-beta.0, <= 9.0.0-beta.20
  • >= 8.0.0, < 8.2.4
  • < 7.2.4
Problem Types
TypeCWE IDDescription
CWECWE-552{"CWE-552":"Files or Directories Accessible to External Parties"}
Type: CWE
CWE ID: CWE-552
Description: {"CWE-552":"Files or Directories Accessible to External Parties"}
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
x_refsource_MISC
https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm
x_refsource_CONFIRM
Hyperlink: https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
Resource:
x_refsource_MISC
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
x_refsource_MISC
x_transferred
https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:07 Jul, 2020 | 00:15
Updated At:13 Jul, 2020 | 18:51

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 7.0.0(inclusive) to 7.2.4(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 8.0.0(inclusive) to 8.2.4(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:-:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta1:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta10:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta11:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta12:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta13:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta14:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta15:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta16:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta17:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta18:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta19:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta2:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta20:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta3:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta4:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta5:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta6:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta7:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta8:*:*:*:*:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>9.0.0
cpe:2.3:a:electronjs:electron:9.0.0:beta9:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-552Primarynvd@nist.gov
CWE-552Secondarysecurity-advisories@github.com
CWE ID: CWE-552
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-552
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhmsecurity-advisories@github.com
Third Party Advisory
https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824security-advisories@github.com
Release Notes
Vendor Advisory
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm
Source: security-advisories@github.com
Resource:
Third Party Advisory
Hyperlink: https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824
Source: security-advisories@github.com
Resource:
Release Notes
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

111Records found

CVE-2021-41573
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.72%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 17:50
Updated-04 Aug, 2024 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a link to a file or folder while the system was running version 4.3.x or earlier and then shares the link and then later deletes the file or folder without deleting the link and before the link expires. If the system has been upgraded to version 4.4.5 or 4.5.0 a malicious user with the link could browse and download all files of the authenticated user that created the link .

Action-Not Available
Vendor-n/aHitachi, Ltd.
Product-content_platform_anywheren/a
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2024-7107
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 29.57%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 12:02
Updated-03 Oct, 2024 | 00:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directory Traversal in National Keep's CyberMath

Files or Directories Accessible to External Parties vulnerability in National Keep Cyber Security Services CyberMath allows Collect Data from Common Resource Locations.This issue affects CyberMath: before CYBM.240816253.

Action-Not Available
Vendor-nationalkeepNational Keep Cyber Security Services
Product-cybermathCyberMath
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2017-2622
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.04% / 12.33%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 13:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An accessibility flaw was found in the OpenStack Workflow (mistral) service where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-openstackopenstack-mistral
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-2621
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 22.46%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access-control flaw was found in the OpenStack Orchestration (heat) service before 8.0.0, 6.1.0 and 7.0.2 where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information.

Action-Not Available
Vendor-OpenStackRed Hat, Inc.
Product-heatopenstackopenstack-heat
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2024-24161
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.40%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 00:00
Updated-12 Jun, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered.

Action-Not Available
Vendor-mrcmsn/a
Product-mrcmsn/a
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2021-25521
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.06% / 19.42%
||
7 Day CHG~0.00%
Published-08 Dec, 2021 | 14:20
Updated-03 Aug, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure caller check in sharevia deeplink logic prior to Samsung Internet 16.0.2 allows unstrusted applications to get current tab URL in Samsung Internet.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-internetSamsung Internet
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2024-5045
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.28% / 50.80%
||
7 Day CHG~0.00%
Published-17 May, 2024 | 12:31
Updated-10 Feb, 2025 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Online Birth Certificate Management System admin file access

A vulnerability was found in SourceCodester Online Birth Certificate Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin. The manipulation leads to files or directories accessible. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264742 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-SourceCodesteroretnom23
Product-online_birth_certificate_management_systemOnline Birth Certificate Management System
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2024-4836
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-7.5||HIGH
EPSS-36.52% / 97.00%
||
7 Day CHG-1.85%
Published-02 Jul, 2024 | 08:44
Updated-01 Aug, 2024 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LFI in sites managed by Edito CMS

Web services managed by Edito CMS (Content Management System) in versions from 3.5 through 3.25 leak sensitive data as they allow downloading configuration files by an unauthenticated user. The issue in versions 3.5 - 3.25 was removed in releases which dates from 10th of January 2014. Higher versions were never affected.

Action-Not Available
Vendor-Editoedito
Product-Edito CMSedito_cms
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2025-1042
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.02% / 4.55%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 15:02
Updated-06 Aug, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Files or Directories Accessible to External Parties in GitLab

An insecure direct object reference vulnerability in GitLab EE affecting all versions from 15.7 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to view repositories in an unauthorized way.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2024-7729
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.37% / 58.18%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 03:52
Updated-16 Aug, 2024 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CAYIN Technology CMS - Sensitive File Download

The CAYIN Technology CMS lacks proper access control, allowing unauthenticated remote attackers to download arbitrary CGI files.

Action-Not Available
Vendor-CAYIN Technology Co.
Product-SMP-2300SMP-6000SMP-8000QDCMS-SESMP-8100CMS-20CMS-SE(22.04)SMP-2100SMP-2200SMP-2210CMS-60SMP-2400SMP-2310CMS-SE(18.04)SMP-8000smp-2100smp-2300cms-se\(22.04\)smp-2400smp-2200cms-se\(18.04\)cms-sesmp-6000smp-2310smp-8100smp-2210smp-8000cms-60smp-8000qdcms-20
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2024-43660
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-7.1||HIGH
EPSS-0.11% / 30.85%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 07:56
Updated-11 Mar, 2025 | 13:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary file download using <redacted>.sh

The CGI script <redacted>.sh can be used to download any file on the filesystem. This issue affects Iocharger firmware for AC model chargers beforeversion 24120701. Likelihood: High, but credentials required. Impact: Critical – The script can be used to download any file on the filesystem, including sensitive files such as /etc/shadow, the CGI script source code or binaries and configuration files. CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The confidentiality of all files of the devicd can be compromised (VC:H/VI:N/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, this attack in isolation does not have a safety impact. The attack can be automated (AU:Y).

Action-Not Available
Vendor-Iocharger
Product-Iocharger firmware for AC models
CWE ID-CWE-552
Files or Directories Accessible to External Parties
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found