CVE-2024-32477

April 18, 2024, 8:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Deno

  • 1.0.0 - 1.42.1

Source

security-advisories@github.com

Tags

CVE-2024-32477 details

Published : April 18, 2024, 8:15 p.m.
Last Modified : April 18, 2024, 8:15 p.m.

Description

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between `libc::tcflush(0, libc::TCIFLUSH)` and reading standard input, it's possible to manipulate the permission prompt and force it to allow an unsafe action regardless of the user input. Some ANSI escape sequences act as a info request to the master terminal emulator and the terminal emulator sends back the reply in the PTY channel. standard streams also use this channel to send and get data. For example the `\033[6n` sequence requests the current cursor position. These sequences allow us to append data to the standard input of Deno. This vulnerability allows an attacker to bypass Deno permission policy. This vulnerability is fixed in 1.42.2.

CVSS Score

1 2 3 4 5 6 7.7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

7.7

Exploitability Score

Impact Score

Base Severity

HIGH

References

URL Source
https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.