Deno runtime vulnerable to spoofed permission prompts
CVE-2024-27936
What is CVE-2024-27936?
The Deno library, a runtime for JavaScript, TypeScript, and WebAssembly, has a vulnerability that allows malicious actors to manipulate the interactive permission prompt using crafted requests. By inserting broken ANSI escape sequences into these requests, attackers can present misleading information to users, such as inaccurate file paths or program names. Although Deno attempts to strip these escape sequences from the prompt, the permissions granted remain based on the original content, which can be exploited. The vulnerability is addressed in version 1.41.0, which includes a crucial patch to enhance security against such spoofing attempts.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
deno >= 1.32.1, < 1.41.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
