### [CVE-2024-27932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27932) ![](https://img.shields.io/static/v1?label=Product&message=deno&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.8.0%2C%20%3C%201.40.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen) ### Description Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `notexample[.]com`. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue ### POC #### Reference - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr #### Github No PoCs found on GitHub currently.