Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-27932
HistoryMar 06, 2024 - 8:45 p.m.

CVE-2024-27932 Deno's improper suffix match testing for DENO_AUTH_TOKENS

2024-03-0620:45:16
CWE-20
GitHub_M
www.cve.org
3
deno
javascript
typescript
webassembly
hostname
import specifier
auth token
patch
security issue

CVSS3

4.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

AI Score

5

Confidence

High

EPSS

0

Percentile

15.5%

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier’s hostname is equal to or a child of a token’s hostname, which can cause tokens to be sent to servers they shouldn’t be sent to. An auth token intended for example[.]com may be sent to notexample[.]com. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue

CNA Affected

[
  {
    "vendor": "denoland",
    "product": "deno",
    "versions": [
      {
        "version": ">= 1.8.0, < 1.40.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

AI Score

5

Confidence

High

EPSS

0

Percentile

15.5%

Related for CVELIST:CVE-2024-27932