Vulnerabilites related to denoland - std
CVE-2025-55195 (GCVE-0-2025-55195)
Vulnerability from cvelistv5
Published
2025-08-14 16:39
Modified
2025-08-14 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Summary
@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9.
References
▼ | URL | Tags |
---|---|---|
https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r | x_refsource_CONFIRM | |
https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b | x_refsource_MISC | |
https://github.com/denoland/std/releases/tag/release-2025.08.13 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55195", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:36:13.234384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:18:25.234Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "std", "vendor": "denoland", "versions": [ { "status": "affected", "version": "\u003c 1.0.9" } ] } ], "descriptions": [ { "lang": "en", "value": "@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1321", "description": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-14T16:39:28.158Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r" }, { "name": "https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b" }, { "name": "https://github.com/denoland/std/releases/tag/release-2025.08.13", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/denoland/std/releases/tag/release-2025.08.13" } ], "source": { "advisory": "GHSA-crjp-8r9q-2j9r", "discovery": "UNKNOWN" }, "title": "@std/toml Prototype Pollution in Node.js and Browser" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55195", "datePublished": "2025-08-14T16:39:28.158Z", "dateReserved": "2025-08-08T21:55:07.964Z", "dateUpdated": "2025-08-14T19:18:25.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52793 (GCVE-0-2024-52793)
Vulnerability from cvelistv5
Published
2024-11-22 15:37
Modified
2024-11-26 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The Deno Standard Library provides APIs for Deno and the Web. Prior to version 1.0.11, `http/file-server`'s `serveDir` with `showDirListing: true` option is vulnerable to cross-site scripting when the attacker is a user who can control file names in the source directory on systems with POSIX file names. Exploitation might also be possible on other systems but less trivial due to e.g. lack of file name support for `<>` in Windows. Version 1.0.11 fixes the issue.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52793", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-22T17:45:39.165782Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:18:57.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "std", "vendor": "denoland", "versions": [ { "status": "affected", "version": "\u003c 1.0.11" } ] } ], "descriptions": [ { "lang": "en", "value": "The Deno Standard Library provides APIs for Deno and the Web. Prior to version 1.0.11, `http/file-server`\u0027s `serveDir` with `showDirListing: true` option is vulnerable to cross-site scripting when the attacker is a user who can control file names in the source directory on systems with POSIX file names. Exploitation might also be possible on other systems but less trivial due to e.g. lack of file name support for `\u003c\u003e` in Windows. Version 1.0.11 fixes the issue." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T15:37:10.829Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/denoland/std/security/advisories/GHSA-32fx-h446-h8pf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/denoland/std/security/advisories/GHSA-32fx-h446-h8pf" }, { "name": "https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L507", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L507" }, { "name": "https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L532", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L532" } ], "source": { "advisory": "GHSA-32fx-h446-h8pf", "discovery": "UNKNOWN" }, "title": "XSS vulnerability in serveDir API of @std/http/file-server on POSIX systems" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52793", "datePublished": "2024-11-22T15:37:10.829Z", "dateReserved": "2024-11-15T17:11:13.439Z", "dateUpdated": "2024-11-26T14:18:57.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }