// For flags

CVE-2022-24783

Sandbox bypass leading to arbitrary code execution in Deno

Severity Score

10.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Deno is a runtime for JavaScript and TypeScript. The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass all permission checks and execute arbitrary shell code. This vulnerability does not affect users of Deno Deploy. The vulnerability has been patched in Deno 1.20.3. There is no workaround. All users are recommended to upgrade to 1.20.3 immediately.

Deno es un tiempo de ejecución para JavaScript y TypeScript. Las versiones de Deno comprendidas entre la versión 1.18.0 y la 1.20.2 (inclusive) son vulnerables a un ataque en el que un actor malicioso que controle el código ejecutado en un tiempo de ejecución de Deno podría omitir todas las comprobaciones de permisos y ejecutar código shell arbitrario. Esta vulnerabilidad no afecta a usuarios de Deno Deploy. La vulnerabilidad ha sido parcheada en Deno versión 1.20.3. No se presenta ninguna medida de mitigación. Es recomendado a todos los usuarios actualizar a versión 1.20.3 inmediatamente

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-10 CVE Reserved
  • 2022-03-25 CVE Published
  • 2023-10-16 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-269: Improper Privilege Management
  • CWE-863: Incorrect Authorization
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Deno
Search vendor "Deno"
Deno
Search vendor "Deno" for product "Deno"
>= 1.18.0 < 1.20.3
Search vendor "Deno" for product "Deno" and version " >= 1.18.0 < 1.20.3"
-
Affected