Bug ID 1207234
Summary VUL-0: CVE-2023-22499: deno: Interactive permission prompt spoofing
Classification openSUSE
Product openSUSE Tumbleweed
Version Current
Hardware Other
URL https://smash.suse.de/issue/354035/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee aavindraa@gmail.com
Reporter thomas.leroy@suse.com
QA Contact security-team@suse.de
Found By ---
Blocker ---

CVE-2023-22499

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in
Rust. Multi-threaded programs were able to spoof interactive permission prompt
by rewriting the prompt to suggest that program is waiting on user confirmation
to unrelated action. A malicious program could clear the terminal screen after
permission prompt was shown and write a generic message. This situation impacts
users who use Web Worker API and relied on interactive permission prompt. The
reproduction is very timing sensitive and can���������t be reliably reproduced on every
try. This problem can not be exploited on systems that do not attach an
interactive prompt (for example headless servers). The problem has been fixed
in
Deno v1.29.3; it is recommended all users update to this version. Users are
advised to upgrade. Users unable to upgrade may run with --no-prompt flag to
disable interactive permission prompts.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22499
https://www.cve.org/CVERecord?id=CVE-2023-22499
https://github.com/denoland/deno/security/advisories/GHSA-mc52-jpm2-cqh6
https://github.com/denoland/deno/pull/17392


You are receiving this mail because: