Authorization Bypass Affecting deno_runtime package, versions >=0.102.0 <0.147.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-DENORUNTIME-6394509
  • published6 Mar 2024
  • disclosed5 Mar 2024
  • creditRyotaK

Introduced: 5 Mar 2024

CVE-2024-27936  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade deno_runtime to version 0.147.0 or higher.

Overview

Affected versions of this package are vulnerable to Authorization Bypass due to improper ANSI stripping. A maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. This discrepancy allows a malicious program to display incorrect file paths or program names to the user, potentially misleading them or gaining unauthorized access.

CVSS Scores

version 3.1