Deno missing "--allow-net" permission check for built-in Node modules
Description
Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in node:http or node:https modules are incorrectly not checked against the network permission allow list (--allow-net). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
denocrates.io | >= 1.34.0, < 1.34.1 | 1.34.1 |
deno_runtimecrates.io | >= 0.114.0, < 0.115.0 | 0.115.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vc52-gwm3-8v2fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-33966ghsaADVISORY
- github.com/denoland/deno/releases/tag/v1.34.1ghsax_refsource_MISCWEB
- github.com/denoland/deno/security/advisories/GHSA-vc52-gwm3-8v2fghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.