CVE-2021-41641

Deno <=1.14.0 file sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory.
References
Link Resource
https://github.com/denoland/deno/issues/12152 Exploit Issue Tracking Third Party Advisory
https://hackers.report/report/614876917a7b150012836bb8 Exploit Third Party Advisory
https://github.com/denoland/deno/issues/12152 Exploit Issue Tracking Third Party Advisory
https://hackers.report/report/614876917a7b150012836bb8 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://github.com/denoland/deno/issues/12152 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/denoland/deno/issues/12152 - Exploit, Issue Tracking, Third Party Advisory
References () https://hackers.report/report/614876917a7b150012836bb8 - Exploit, Third Party Advisory () https://hackers.report/report/614876917a7b150012836bb8 - Exploit, Third Party Advisory

Information

Published : 2022-06-12 13:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41641

Mitre link : CVE-2021-41641

CVE.ORG link : CVE-2021-41641


JSON object : View

Products Affected

deno

  • deno
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')