← Back to CVEs
CVE-2021-32619
CRITICAL9.8
Description
Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/28/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
deno:deno
Weaknesses (CWE)
CWE-285CWE-863
References
https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj(security-advisories@github.com)
https://github.com/denoland/deno/security/advisories/GHSA-xpwj-7v8q-mcgj(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.