CVE-2023-23623
JavaScript vulnerability analysis and mitigation

Overview

Electron, a framework for building cross-platform desktop applications using JavaScript, HTML, and CSS, was found to have a security vulnerability (CVE-2023-23623) affecting versions 22 and 23. The vulnerability was discovered when a Content-Security-Policy that disables eval through script-src directive (without unsafe-eval) was not properly enforced in renderers with sandbox disabled (GitHub Advisory, NVD).

Technical details

The vulnerability allows the usage of methods like eval() and new Function unexpectedly in renderers where sandbox is set to false in the webPreferences object. This bypass of Content-Security-Policy restrictions occurs specifically when sandbox and contextIsolation are disabled. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) by NVD and 7.5 (HIGH) by GitHub, indicating its severe nature (NVD).

Impact

The vulnerability results in an expanded attack surface by allowing the execution of potentially malicious code through eval() and new Function methods, which should have been blocked by the Content-Security-Policy. This could lead to unauthorized code execution within the application context (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in Electron versions 22.0.1 and 23.0.0-alpha.2. If upgrading isn't possible, the vulnerability can be mitigated by enabling sandbox: true or contextIsolation: true on all renderers. It is recommended that all applications upgrade to the latest stable version of Electron (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management