cve/2024/CVE-2024-27932.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-27932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27932)
![](https://img.shields.io/static/v1?label=Product&message=deno&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.8.0%2C%20%3C%201.40.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
### Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `notexample[.]com`. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue
### POC
#### Reference
- https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr
2024-06-09 00:33:16 +00:00
- https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.