Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-27933

Опубликовано: 21 мар. 2024
Источник: nvd
CVSS3: 8.2
CVSS3: 8.8
EPSS Низкий

Описание

Deno is a JavaScript, TypeScript, and WebAssembly runtime. In version 1.39.0, use of raw file descriptors in op_node_ipc_pipe() leads to premature close of arbitrary file descriptors, allowing standard input to be re-opened as a different resource resulting in permission prompt bypass. Node child_process IPC relies on the JS side to pass the raw IPC file descriptor to op_node_ipc_pipe(), which returns a IpcJsonStreamResource ID associated with the file descriptor. On closing the resource, the raw file descriptor is closed together.

Use of raw file descriptors in op_node_ipc_pipe() leads to premature close of arbitrary file descriptors. This allow standard input (fd 0) to be closed and re-opened for a different resource, which allows a silent permission prompt bypass. This is exploitable by an attacker controlling the code executed inside a Deno runtime to obtain arbitrary code execution on the host machine regardless of permissions.

This bug is known to be exploitable. There

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:deno:deno:1.39.0:*:*:*:*:*:*:*

EPSS

Процентиль: 3%
0.00016
Низкий

8.2 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-863
CWE-863

Связанные уязвимости

CVSS3: 8.2
github
почти 2 года назад

Deno arbitrary file descriptor close via `op_node_ipc_pipe()` leading to permission prompt bypass

EPSS

Процентиль: 3%
0.00016
Низкий

8.2 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-863
CWE-863