CVE-2024-27931
CVSS V2 None
CVSS V3 None
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1.
Overview
- CVE ID
- CVE-2024-27931
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-05T16:43:11.934Z
- Last Modified Date
- 2024-03-05T16:43:11.934Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh | x_refsource_CONFIRM |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-27931 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27931 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 01:43:23 | Added to TrackCVE |