CVE-2023-33966
CVSS V2 None
CVSS V3 None
Description
Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
Overview
- CVE ID
- CVE-2023-33966
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-05-31T17:15:13.791Z
- Last Modified Date
- 2023-05-31T17:15:13.791Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2f | x_refsource_CONFIRM |
https://github.com/denoland/deno/releases/tag/v1.34.1 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-33966 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33966 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 08:09:05 | Added to TrackCVE |