CVE-2024-27936

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27936
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27936.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27936
Aliases
Related
Published
2024-03-21T02:52:22Z
Modified
2025-01-15T05:11:37.359925Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue.

References

Affected packages

Git / github.com/denoland/deno

Affected ranges

Type
GIT
Repo
https://github.com/denoland/deno
Events
Type
GIT
Repo
https://github.com/denoland/deno_std
Events

Affected versions

0.*

0.103.0
0.104.0
0.105.0
0.106.0
0.107.0
0.108.0
0.109.0
0.110.0
0.111.0
0.112.0
0.113.0
0.114.0
0.115.0
0.115.1
0.116.0
0.117.0
0.118.0
0.119.0
0.120.0
0.121.0
0.122.0
0.123.0
0.124.0
0.125.0
0.126.0
0.127.0
0.128.0
0.129.0
0.130.0
0.131.0
0.132.0
0.133.0
0.134.0
0.135.0
0.136.0
0.137.0
0.138.0
0.140.0
0.141.0
0.142.0
0.143.0
0.144.0
0.145.0
0.146.0

std/0.*

std/0.34.0
std/0.35.0
std/0.36.0
std/0.37.0
std/0.38.0
std/0.39.0
std/0.40.0
std/0.41.0
std/0.42.0
std/0.50.0
std/0.51.0
std/0.52.0
std/0.53.0
std/0.54.0
std/0.55.0
std/0.56.0
std/0.57.0
std/0.58.0
std/0.59.0
std/0.60.0
std/0.61.0
std/0.62.0
std/0.63.0
std/0.64.0
std/0.65.0
std/0.66.0
std/0.67.0
std/0.68.0
std/0.69.0
std/0.70.0
std/0.71.0
std/0.72.0
std/0.73.0
std/0.74.0
std/0.75.0
std/0.76.0
std/0.77.0
std/0.78.0
std/0.79.0
std/0.80.0
std/0.81.0
std/0.82.0
std/0.83.0
std/0.84.0
std/0.85.0

v0.*

v0.0.1
v0.0.3
v0.1.0
v0.1.1
v0.1.10
v0.1.11
v0.1.12
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.1.9
v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.14.0
v0.15.0
v0.16.0
v0.17.0
v0.18.0
v0.19.0
v0.2.0
v0.2.1
v0.2.10
v0.2.11
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v0.2.7
v0.2.8
v0.2.9
v0.20.0
v0.21.0
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.27.0
v0.28.0
v0.28.1
v0.29.0
v0.3.0
v0.3.1
v0.3.10
v0.3.11
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.30.0
v0.30.1
v0.31.0
v0.32.0
v0.33.0
v0.34.0
v0.35.0
v0.36.0
v0.37.0
v0.37.1
v0.38.0
v0.39.0
v0.4.0
v0.40.0
v0.41.0
v0.42.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0

v1.*

v1.0.0
v1.0.0-rc1
v1.0.0-rc2
v1.0.0-rc3
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.10.0
v1.10.1
v1.10.3
v1.11.0
v1.11.1
v1.11.2
v1.12.0
v1.12.1
v1.12.2
v1.13.0
v1.13.1
v1.13.2
v1.14.0
v1.14.1
v1.14.2
v1.15.0
v1.15.1
v1.15.2
v1.15.3
v1.16.0
v1.16.1
v1.16.2
v1.17.0
v1.18.0
v1.19.0
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.20.0
v1.20.1
v1.21.0
v1.22.0
v1.23.0
v1.24.0
v1.25.0
v1.26.0
v1.27.0
v1.28.0
v1.29.0
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.30.0
v1.31.0
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.5.4
v1.6.0
v1.6.1
v1.6.2
v1.6.3
v1.7.0
v1.7.1
v1.7.2
v1.7.3
v1.7.4
v1.8.0
v1.8.1
v1.8.2
v1.9.0
v1.9.1
v1.9.2