ghsa-vc52-gwm3-8v2f
Vulnerability from github
Published
2023-05-31 23:39
Modified
2023-05-31 23:39
Severity ?
Summary
Missing "--allow-net" permission check for built-in Node modules
Details
Impact
Outbound HTTP requests made using the built-in "node:http" or "node:https" modules are incorrectly not checked against the network permission allow list (--allow-net
). Dependencies relying on these built-in modules are subject to the vulnerability too.
Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected.
Patches
This problem has been patched in Deno v1.34.1 and all users are recommended to update to this version.
Workarounds
No workaround is available for this issue.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "deno" }, "ranges": [ { "events": [ { "introduced": "1.34.0" }, { "fixed": "1.34.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "1.34.0" ] }, { "package": { "ecosystem": "crates.io", "name": "deno_runtime" }, "ranges": [ { "events": [ { "introduced": "0.114.0" }, { "fixed": "0.115.0" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.114.0" ] } ], "aliases": [ "CVE-2023-33966" ], "database_specific": { "cwe_ids": [ "CWE-269", "CWE-276" ], "github_reviewed": true, "github_reviewed_at": "2023-05-31T23:39:40Z", "nvd_published_at": "2023-05-31T18:15:09Z", "severity": "HIGH" }, "details": "### Impact\n\nOutbound HTTP requests made using the built-in \"node:http\" or \"node:https\" modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too.\n\nUsers of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected.\n\n### Patches\n\nThis problem has been patched in Deno v1.34.1 and all users are recommended to update to this version.\n\n### Workarounds\n\nNo workaround is available for this issue.\n", "id": "GHSA-vc52-gwm3-8v2f", "modified": "2023-05-31T23:39:40Z", "published": "2023-05-31T23:39:40Z", "references": [ { "type": "WEB", "url": "https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33966" }, { "type": "PACKAGE", "url": "https://github.com/denoland/deno" }, { "type": "WEB", "url": "https://github.com/denoland/deno/releases/tag/v1.34.1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Missing \"--allow-net\" permission check for built-in Node modules" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.