Skip to content

Sandbox bypass leading to arbitrary code execution

Critical
lucacasonato published GHSA-838h-jqp6-cf2f Mar 25, 2022

Package

cargo deno (Rust)

Affected versions

>=1.18.0, <=1.20.2

Patched versions

>=1.20.3

Description

Impact

The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code.

There is no evidence that this vulnerability has been exploited in the wild.

This vulnerability does not affect users of Deno Deploy.

Patches

The vulnerability has been patched in Deno 1.20.3.

Workarounds

There is no workaround. All users are recommended to upgrade to 1.20.3 immediately


The cause of this error was that certain FFI operations did not correctly check for permissions. The issue was fixed in this pull request.

Severity

Critical

CVE ID

CVE-2022-24783

Weaknesses

Credits