Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-838h-jqp6-cf2f

Опубликовано: 29 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

Sandbox bypass leading to arbitrary code execution in Deno

Impact

The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code.

There is no evidence that this vulnerability has been exploited in the wild.

This vulnerability does not affect users of Deno Deploy.

Patches

The vulnerability has been patched in Deno 1.20.3.

Workarounds

There is no workaround. All users are recommended to upgrade to 1.20.3 immediately


The cause of this error was that certain FFI operations did not correctly check for permissions. The issue was fixed in this pull request.

Пакеты

Наименование

deno

rust
Затронутые версииВерсия исправления

>= 1.18.0, < 1.20.3

1.20.3

EPSS

Процентиль: 58%
0.00363
Низкий

10 Critical

CVSS3

Дефекты

CWE-269
CWE-863

Связанные уязвимости

CVSS3: 10
nvd
почти 4 года назад

Deno is a runtime for JavaScript and TypeScript. The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass all permission checks and execute arbitrary shell code. This vulnerability does not affect users of Deno Deploy. The vulnerability has been patched in Deno 1.20.3. There is no workaround. All users are recommended to upgrade to 1.20.3 immediately.

EPSS

Процентиль: 58%
0.00363
Низкий

10 Critical

CVSS3

Дефекты

CWE-269
CWE-863