Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0943 | Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Insufficient validation of parameters in `Deno.makeTemp*` APIs would allow for creation of files outside of the allowed directories. This may allow the user to overwrite important files on the system that may affect other systems. A user may provide a prefix or suffix to a `Deno.makeTemp*` API containing path traversal characters. This is fixed in Deno 1.41.1. |
Github GHSA |
GHSA-hrqr-jv8w-v9jh | Insufficient permission checking in `Deno.makeTemp*` APIs |
References
History
Fri, 03 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:41:55.851Z
Reserved: 2024-02-28T15:14:14.216Z
Link: CVE-2024-27931
Updated: 2024-07-19T14:34:41.180Z
Status : Analyzed
Published: 2024-03-05T17:15:07.310
Modified: 2025-01-03T19:29:35.223
Link: CVE-2024-27931
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA