Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m3c4-prhw-mrx6

Опубликовано: 16 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Deno has an incomplete fix for command-injection prevention on Windows — case-insensitive extension bypass

Summary

A prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.).

POC

const command = new Deno.Command('./test.BAT', { args: ['&calc.exe'], }); const child = command.spawn();

This causes calc.exe to be launched; see the attached screenshot for evidence.

Patched in CVE-2025-61787 — prevents execution of .bat and .cmd files: photo_2025-10-10 02 27 23

Bypass of the patched vulnerability: photo_2025-10-10 02 27 25

Impact

The script launches calc.exe on Windows, demonstrating that passing user-controlled arguments to a spawned batch script can result in command-line injection.

Mitigation

Users should update to Deno v2.5.6 or newer.

Пакеты

Наименование

deno

rust
Затронутые версииВерсия исправления

< 2.5.6

2.5.6

EPSS

Процентиль: 19%
0.00061
Низкий

8.1 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.1
nvd
22 дня назад

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.5.6, a prior patch aimed to block spawning Windows batch/shell files by returning an error when a spawned path’s extension matched .bat or .cmd. That check performs a case-sensitive comparison against lowercase literals and therefore can be bypassed when the extension uses alternate casing (for example .BAT, .Bat, etc.). This vulnerability is fixed in 2.5.6.

EPSS

Процентиль: 19%
0.00061
Низкий

8.1 High

CVSS3

Дефекты

CWE-77