Arbitrary Code Execution Vulnerability in Deno Runtime
CVE-2024-27934

8.8HIGH

Key Information:

Vendor

Denoland

Status
Vendor
CVE Published:
21 March 2024

What is CVE-2024-27934?

The Deno runtime, which supports JavaScript, TypeScript, and WebAssembly, has been identified to contain a significant vulnerability stemming from the usage of inherently unsafe *const c_void and ExternalPointer components. This flaw allows an attacker, controlling the executed code within a Deno environment, to exploit use-after-free conditions, leading to arbitrary code execution on the host system. Versions affected include those starting at 1.36.2 and preceding 1.40.3. The vulnerability presents serious security implications, as it can be exploited regardless of the permissions set on the Deno runtime. This issue was addressed in version 1.40.3, highlighting the critical importance of using updated software to safeguard against potential exploits.

Affected Version(s)

deno >= 1.36.2, < 1.40.3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.