Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-05-31T17:15:13.791Z
Updated: 2024-08-02T15:54:14.202Z
Reserved: 2023-05-24T13:46:35.953Z
Link: CVE-2023-33966
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-05-31T18:15:09.527
Modified: 2024-11-21T08:06:18.630
Link: CVE-2023-33966
Redhat
No data.