Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-33966
HistoryMay 31, 2023 - 6:15 p.m.

Design/Logic Flaw

2023-05-3118:15:00
PRIOn knowledge base
www.prio-n.com
4
deno runtime
logic flaw
outbound http
node:http
node:https
network permission
vulnerability
patched
update
deno deploy
nvd

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in node:http or node:https modules are incorrectly not checked against the network permission allow list (--allow-net). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.

CPENameOperatorVersion
denoeq1.34.0
deno_runtimeeq0.114.0

9.4 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.0%

Related for PRION:CVE-2023-33966