Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2134 | Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2. |
Github GHSA |
GHSA-xpwj-7v8q-mcgj | Deno's static imports inside dynamically imported modules do not adhere to permission checks |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T23:25:30.920Z
Reserved: 2021-05-12T00:00:00
Link: CVE-2021-32619
No data.
Status : Modified
Published: 2021-05-28T21:15:08.893
Modified: 2024-11-21T06:07:23.627
Link: CVE-2021-32619
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA