Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-vc52-gwm3-8v2f: Missing "--allow-net" permission check for built-in Node modules

Impact

Outbound HTTP requests made using the built-in “node:http” or “node:https” modules are incorrectly not checked against the network permission allow list (--allow-net). Dependencies relying on these built-in modules are subject to the vulnerability too.

Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected.

Patches

This problem has been patched in Deno v1.34.1 and all users are recommended to update to this version.

Workarounds

No workaround is available for this issue.

ghsa
#vulnerability#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-33966

Missing “–allow-net” permission check for built-in Node modules

High severity GitHub Reviewed Published May 30, 2023 in denoland/deno • Updated May 31, 2023

Package

cargo deno (Rust)

Affected versions

= 1.34.0

cargo deno_runtime (Rust)

Impact

Outbound HTTP requests made using the built-in “node:http” or “node:https” modules are incorrectly not checked against the network permission allow list (–allow-net). Dependencies relying on these built-in modules are subject to the vulnerability too.

Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected.

Patches

This problem has been patched in Deno v1.34.1 and all users are recommended to update to this version.

Workarounds

No workaround is available for this issue.

References

  • GHSA-vc52-gwm3-8v2f
  • https://nvd.nist.gov/vuln/detail/CVE-2023-33966
  • https://github.com/denoland/deno/releases/tag/v1.34.1

Published to the GitHub Advisory Database

May 31, 2023

Last updated

May 31, 2023

Related news

CVE-2023-33966: Missing "--allow-net" permission check for built-in Node modules

Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.