You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description
Since contextIsolation is not mentioned hence it will be disabled by default. This means the Electron APIs and the preload script run in the same context, hence an XSS vulnerability could allow an attacker to re-define app functionality via prototype tampering.
Description
Since contextIsolation is not mentioned hence it will be disabled by default. This means the Electron APIs and the preload script run in the same context, hence an XSS vulnerability could allow an attacker to re-define app functionality via prototype tampering.
Proof:
webPreferences: {
preload: join(__dirname, 'preload.js'),
nodeIntegration: false
}
Since "contextIsolation" is not mentioned. This will be by default set to false.
Suggested Fix:
It should have contextIsolation: true
Ref:
https://www.electronjs.org/docs/tutorial/context-isolation
Note: I saw the bug bounty program of waves at https://forum.wavesplatform.com/t/bug-bounty-program/1127
However the email
bug-bounty@wavesplatform.com.
is dead.The text was updated successfully, but these errors were encountered: