2024-03-21 13:04:12 +00:00
{
"id" : "CVE-2024-27932" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-03-21T02:52:21.953" ,
2025-01-03 21:03:44 +00:00
"lastModified" : "2025-01-03T19:19:52.197" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-03-21 13:04:12 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.8.0 and prior to version 1.40.4, Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for `example[.]com` may be sent to `notexample[.]com`. Anyone who uses DENO_AUTH_TOKENS and imports potentially untrusted code is affected. Version 1.40.0 contains a patch for this issue"
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Deno es un tiempo de ejecuci\u00f3n de JavaScript, TypeScript y WebAssembly. A partir de la versi\u00f3n 1.8.0 y antes de la versi\u00f3n 1.40.4, Deno verifica incorrectamente que el nombre de host de un especificador de importaci\u00f3n sea igual o hijo del nombre de host de un token, lo que puede causar que los tokens se env\u00eden a servidores a los que no deber\u00edan enviarse. Un token de autenticaci\u00f3n destinado a `example[.]com` puede enviarse a `notexample[.]com`. Cualquiera que utilice DENO_AUTH_TOKENS e importe c\u00f3digo potencialmente no confiable se ver\u00e1 afectado. La versi\u00f3n 1.40.0 contiene un parche para este problema"
2024-03-21 13:04:12 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.6 ,
"baseSeverity" : "MEDIUM" ,
2024-03-21 13:04:12 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-03-21 13:04:12 +00:00
} ,
"exploitabilityScore" : 2.1 ,
"impactScore" : 2.5
2025-01-03 21:03:44 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" ,
"baseScore" : 4.6 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.1 ,
"impactScore" : 2.5
2024-03-21 13:04:12 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
2025-01-03 21:03:44 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.8.0" ,
"versionEndExcluding" : "1.40.4" ,
"matchCriteriaId" : "848BE47F-134F-4489-BC2C-785B5B0C0AAB"
}
]
}
]
2024-03-21 13:04:12 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/denoland/deno/blob/3f4639c330a31741b0efda2f93ebbb833f4f95bc/cli/auth_tokens.rs#L89" ,
2025-01-03 21:03:44 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Product"
]
2024-03-21 13:04:12 +00:00
} ,
{
"url" : "https://github.com/denoland/deno/commit/de23e3b60b066481cc390f459497d5bef42a899b" ,
2025-01-03 21:03:44 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-03-21 13:04:12 +00:00
} ,
{
"url" : "https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr" ,
2025-01-03 21:03:44 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/denoland/deno/blob/3f4639c330a31741b0efda2f93ebbb833f4f95bc/cli/auth_tokens.rs#L89" ,
2025-01-03 21:03:44 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/denoland/deno/commit/de23e3b60b066481cc390f459497d5bef42a899b" ,
2025-01-03 21:03:44 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr" ,
2025-01-03 21:03:44 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-03-21 13:04:12 +00:00
}
]
}