CVE-2021-32619

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - Third Party Advisory () https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj - Third Party Advisory

Information

Published : 2021-05-28 21:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32619

Mitre link : CVE-2021-32619

CVE.ORG link : CVE-2021-32619


JSON object : View

Products Affected

deno

  • deno
CWE
CWE-285

Improper Authorization

CWE-863

Incorrect Authorization