Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
References
Link | Resource |
---|---|
https://github.com/denoland/deno/releases/tag/v1.34.1 | Release Notes |
https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Jun 2023, 17:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:deno:deno:1.34.0:*:*:*:*:*:*:* cpe:2.3:a:deno:deno_runtime:0.114.0:*:*:*:*:rust:*:* |
|
CWE | CWE-276 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://github.com/denoland/deno/releases/tag/v1.34.1 - Release Notes | |
References | (MISC) https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f - Vendor Advisory |
31 May 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-31 18:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-33966
Mitre link : CVE-2023-33966
CVE.ORG link : CVE-2023-33966
JSON object : View
Products Affected
deno
- deno_runtime
- deno