Improper Authorization Affecting deno package, versions <1.43.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-DENO-6814539
  • published8 May 2024
  • disclosed7 May 2024
  • creditCristian-Alexandru STAICU

Introduced: 7 May 2024

CVE-2024-34346  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade deno to version 1.43.1 or higher.

Overview

deno is an a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust.

Affected versions of this package are vulnerable to Improper Authorization due to improper handling of file-system operations on privileged files. An attacker can escalate permissions and access or modify system-level files by exploiting the lack of explicit deny flags in command-line arguments.

References

CVSS Scores

version 3.1