CVE-2021-32619

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*

History

05 Aug 2022, 12:36

Type Values Removed Values Added
CWE CWE-285 CWE-863

08 Jun 2021, 17:07

Type Values Removed Values Added
CPE cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*
CWE CWE-285
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (CONFIRM) https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - (CONFIRM) https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - Third Party Advisory

28 May 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 21:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32619

Mitre link : CVE-2021-32619

CVE.ORG link : CVE-2021-32619


JSON object : View

Products Affected

deno

  • deno
CWE
CWE-863

Incorrect Authorization

CWE-285

Improper Authorization