Deno interactive permission prompt spoofing via improper ANSI stripping
Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
denocrates.io | >= 1.32.1, < 1.41.0 | 1.41.0 |
deno_runtimecrates.io | >= 0.103.0, < 0.147.0 | 0.147.0 |
Affected products
1Patches
27e6b94231290feat(core): highlight unprintable chars in permission prompts (#22468)
2 files changed · +29 −21
runtime/permissions/prompter.rs+21 −9 modified@@ -11,12 +11,24 @@ use std::io::StderrLock; use std::io::StdinLock; use std::io::Write as IoWrite; -/// Helper function to strip ansi codes and ASCII control characters. -fn strip_ansi_codes_and_ascii_control(s: &str) -> std::borrow::Cow<str> { - console_static_text::ansi::strip_ansi_codes(s) - .chars() - .filter(|c| !c.is_ascii_control()) - .collect() +/// Helper function to make control characters visible so users can see the underlying filename. +fn escape_control_characters(s: &str) -> std::borrow::Cow<str> { + if !s.contains(|c: char| c.is_ascii_control() || c.is_control()) { + return std::borrow::Cow::Borrowed(s); + } + let mut output = String::with_capacity(s.len() * 2); + for c in s.chars() { + match c { + c if c.is_ascii_control() => output.push_str( + &colors::white_bold_on_red(c.escape_debug().to_string()).to_string(), + ), + c if c.is_control() => output.push_str( + &colors::white_bold_on_red(c.escape_debug().to_string()).to_string(), + ), + c => output.push(c), + } + } + output.into() } pub const PERMISSION_EMOJI: &str = "⚠️"; @@ -249,9 +261,9 @@ impl PermissionPrompter for TtyPrompter { return PromptResponse::Deny; // don't grant permission if this fails } - let message = strip_ansi_codes_and_ascii_control(message); - let name = strip_ansi_codes_and_ascii_control(name); - let api_name = api_name.map(strip_ansi_codes_and_ascii_control); + let message = escape_control_characters(message); + let name = escape_control_characters(name); + let api_name = api_name.map(escape_control_characters); // print to stderr so that if stdout is piped this is still displayed. let opts: String = if is_unary {
tests/integration/run_tests.rs+8 −12 modified@@ -4725,19 +4725,19 @@ fn stdio_streams_are_locked_in_permission_prompt() { } #[test] -fn permission_prompt_strips_ansi_codes_and_control_chars() { +fn permission_prompt_escapes_ansi_codes_and_control_chars() { util::with_pty(&["repl"], |mut console| { console.write_line( r#"Deno.permissions.request({ name: "env", variable: "\rDo you like ice cream? y/n" });"# ); // will be uppercase on windows let env_name = if cfg!(windows) { - "DO YOU LIKE ICE CREAM? Y/N" + "\\rDO YOU LIKE ICE CREAM? Y/N" } else { - "Do you like ice cream? y/n" + "\\rDo you like ice cream? y/n" }; console.expect(format!( - "┌ ⚠️ Deno requests env access to \"{}\".", + "\u{250c} \u{26a0}\u{fe0f} Deno requests env access to \"{}\".", env_name )) }); @@ -4747,14 +4747,10 @@ fn permission_prompt_strips_ansi_codes_and_control_chars() { console.expect("undefined"); console.write_line_raw(r#"const unboldANSI = "\u001b[22m";"#); console.expect("undefined"); - console.write_line_raw(r#"const prompt = `┌ ⚠️ ${boldANSI}Deno requests run access to "echo"${unboldANSI}\n ├ Requested by \`Deno.Command().output()`"#); - console.expect("undefined"); - console.write_line_raw(r#"const moveANSIUp = "\u001b[1A";"#); - console.expect("undefined"); - console.write_line_raw(r#"const clearANSI = "\u001b[2K";"#); - console.expect("undefined"); - console.write_line_raw(r#"const moveANSIStart = "\u001b[1000D";"#); - console.expect("undefined"); + console.write_line_raw( + r#"new Deno.Command(`${boldANSI}cat${unboldANSI}`).spawn();"#, + ); + console.expect("\u{250c} \u{26a0}\u{fe0f} Deno requests run access to \"\\u{1b}[1mcat\\u{1b}[22m\"."); }); }
78d430103a8ffix(prompt): better output with control chars (#18108)
6 files changed · +65 −5
Cargo.lock+3 −2 modified@@ -525,9 +525,9 @@ dependencies = [ [[package]] name = "console_static_text" -version = "0.3.4" +version = "0.7.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f166cdfb9db0607e2079b382ba64bc4164344006c733b95c1ecfa782a180a34a" +checksum = "953d2c3cf53213a4eccdbe8f2e0b49b5d0f77e87a2a9060117bbf9346f92b64e" dependencies = [ "unicode-width", "vte", @@ -1285,6 +1285,7 @@ name = "deno_runtime" version = "0.99.0" dependencies = [ "atty", + "console_static_text", "deno_ast", "deno_broadcast_channel", "deno_cache",
Cargo.toml+1 −0 modified@@ -84,6 +84,7 @@ base64 = "=0.13.1" bencher = "0.1" bytes = "=1.2.1" cache_control = "=0.2.0" +console_static_text = "=0.7.1" data-url = "=0.2.0" dlopen = "0.1.8" encoding_rs = "=0.8.31"
cli/Cargo.toml+1 −1 modified@@ -62,7 +62,7 @@ chrono = { version = "=0.4.22", default-features = false, features = ["clock"] } clap = "=3.1.12" clap_complete = "=3.1.2" clap_complete_fig = "=3.1.5" -console_static_text = "=0.3.4" +console_static_text.workspace = true data-url.workspace = true dissimilar = "=1.0.4" dprint-plugin-json = "=0.17.0"
cli/tests/integration/run_tests.rs+45 −0 modified@@ -4027,6 +4027,51 @@ fn stdio_streams_are_locked_in_permission_prompt() { }); } +#[test] +fn permission_prompt_strips_ansi_codes_and_control_chars() { + let _guard = util::http_server(); + util::with_pty(&["repl"], |mut console| { + console.write_line( + r#"Deno.permissions.request({ name: "env", variable: "\rDo you like ice cream? y/n" });"# + ); + console.write_line("close();"); + let output = console.read_all_output(); + + assert!(output.contains( + "┌ ⚠️ Deno requests env access to \"Do you like ice cream? y/n\"." + )); + }); + + util::with_pty(&["repl"], |mut console| { + console.write_line( + r#" +const boldANSI = "\u001b[1m" // bold +const unboldANSI = "\u001b[22m" // unbold + +const prompt = `┌ ⚠️ ${boldANSI}Deno requests run access to "echo"${unboldANSI} +├ Requested by \`Deno.Command().output()` + +const moveANSIUp = "\u001b[1A" // moves to the start of the line +const clearANSI = "\u001b[2K" // clears the line +const moveANSIStart = "\u001b[1000D" // moves to the start of the line + +Deno[Object.getOwnPropertySymbols(Deno)[0]].core.ops.op_spawn_child({ + cmd: "cat", + args: ["/etc/passwd"], + clearEnv: false, + env: [], + stdin: "null", + stdout: "inherit", + stderr: "piped" +}, moveANSIUp + clearANSI + moveANSIStart + prompt)"#, + ); + console.write_line("close();"); + let output = console.read_all_output(); + + assert!(output.contains(r#"┌ ⚠️ Deno requests run access to "cat""#)); + }); +} + itest!(node_builtin_modules_ts { args: "run --quiet --allow-read run/node_builtin_modules/mod.ts hello there", output: "run/node_builtin_modules/mod.ts.out",
runtime/Cargo.toml+1 −0 modified@@ -86,6 +86,7 @@ deno_websocket.workspace = true deno_webstorage.workspace = true atty.workspace = true +console_static_text.workspace = true dlopen.workspace = true encoding_rs.workspace = true filetime = "0.2.16"
runtime/permissions/prompter.rs+14 −2 modified@@ -5,6 +5,14 @@ use deno_core::error::AnyError; use deno_core::parking_lot::Mutex; use once_cell::sync::Lazy; +/// Helper function to strip ansi codes and ASCII control characters. +fn strip_ansi_codes_and_ascii_control(s: &str) -> std::borrow::Cow<str> { + console_static_text::strip_ansi_codes(s) + .chars() + .filter(|c| !c.is_ascii_control()) + .collect() +} + pub const PERMISSION_EMOJI: &str = "⚠️"; #[derive(Debug, Eq, PartialEq)] @@ -203,6 +211,10 @@ impl PermissionPrompter for TtyPrompter { let _stdout_guard = std::io::stdout().lock(); let _stderr_guard = std::io::stderr().lock(); + let message = strip_ansi_codes_and_ascii_control(message); + let name = strip_ansi_codes_and_ascii_control(name); + let api_name = api_name.map(strip_ansi_codes_and_ascii_control); + // print to stderr so that if stdout is piped this is still displayed. let opts: String = if is_unary { format!("[y/n/A] (y = yes, allow; n = no, deny; A = allow all {name} permissions)") @@ -211,9 +223,9 @@ impl PermissionPrompter for TtyPrompter { }; eprint!("┌ {PERMISSION_EMOJI} "); eprint!("{}", colors::bold("Deno requests ")); - eprint!("{}", colors::bold(message)); + eprint!("{}", colors::bold(message.clone())); eprintln!("{}", colors::bold(".")); - if let Some(api_name) = api_name { + if let Some(api_name) = api_name.clone() { eprintln!("├ Requested by `{api_name}` API"); } let msg = format!("Run again with --allow-{name} to bypass this prompt.");
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-m4pq-fv2w-6hrwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-27936ghsaADVISORY
- github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286dghsax_refsource_MISCWEB
- github.com/denoland/deno/commit/7e6b94231290020b55f1d08fb03ea8132781abc5ghsax_refsource_MISCWEB
- github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrwghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.