Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-33966
HistoryMay 31, 2023 - 5:15 p.m.

CVE-2023-33966 Deno missing "--allow-net" permission check for built-in Node modules

2023-05-3117:15:13
CWE-269
GitHub_M
www.cve.org
deno
javascript
typescript
outbound http requests
network permission
vulnerability
deno versions
deno deploy
patch
update

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in node:http or node:https modules are incorrectly not checked against the network permission allow list (--allow-net). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.

CNA Affected

[
  {
    "vendor": "denoland",
    "product": "deno",
    "versions": [
      {
        "version": "deno = 1.34.0",
        "status": "affected"
      },
      {
        "version": "deno_runtime  = 0.114.0",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Related for CVELIST:CVE-2023-33966