Deno is a runtime for JavaScript and TypeScript. In deno 1.34.0 and deno_runtime 0.114.0, outbound HTTP requests made using the built-in `node:http` or `node:https` modules are incorrectly not checked against the network permission allow list (`--allow-net`). Dependencies relying on these built-in modules are subject to the vulnerability too. Users of Deno versions prior to 1.34.0 are unaffected. Deno Deploy users are unaffected. This problem has been patched in Deno v1.34.1 and deno_runtime 0.114.1 and all users are recommended to update to this version. No workaround is available for this issue.
History

Thu, 09 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-09T20:24:06.794Z

Reserved: 2023-05-24T13:46:35.953Z

Link: CVE-2023-33966

cve-icon Vulnrichment

Updated: 2024-08-02T15:54:14.202Z

cve-icon NVD

Status : Modified

Published: 2023-05-31T18:15:09.527

Modified: 2024-11-21T08:06:18.630

Link: CVE-2023-33966

cve-icon Redhat

No data.