CVE-2023-33966

Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:deno:deno:1.34.0:*:*:*:*:*:*:*
cpe:2.3:a:deno:deno_runtime:0.114.0:*:*:*:*:rust:*:*

History

07 Jun 2023, 17:58

Type Values Removed Values Added
CPE cpe:2.3:a:deno:deno_runtime:0.114.0:*:*:*:*:rust:*:*
cpe:2.3:a:deno:deno:1.34.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Deno deno Runtime
Deno
Deno deno
References (MISC) https://github.com/denoland/deno/releases/tag/v1.34.1 - (MISC) https://github.com/denoland/deno/releases/tag/v1.34.1 - Release Notes
References (MISC) https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f - (MISC) https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f - Vendor Advisory
CWE CWE-276

31 May 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-31 18:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-33966

Mitre link : CVE-2023-33966

CVE.ORG link : CVE-2023-33966


JSON object : View

Products Affected

deno

  • deno_runtime
  • deno
CWE
CWE-276

Incorrect Default Permissions

CWE-269

Improper Privilege Management