Miggo Logo

CVE-2024-27932: Deno's improper suffix match testing for DENO_AUTH_TOKENS

4.6

CVSS Score
3.1

Basic Information

EPSS Score
0.6268%
Published
3/6/2024
Updated
3/21/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
denorust>= 1.8.0, < 1.40.41.40.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from the hostname matching logic in AuthTokens::get, which used hostname.to_lowercase().ends_with(&t.host). This allowed suffix matches without proper domain boundary validation. The commit diff shows this logic was replaced with AuthDomain::matches that adds proper domain validation, confirming the original function's vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry **no improp*rly ****ks t**t *n import sp**i*i*r's *ostn*m* is *qu*l to or * **il* o* * tok*n's *ostn*m*, w*i** **n **us* tok*ns to ** s*nt to s*rv*rs t**y s*oul*n't ** s*nt to. *n *ut* tok*n int*n*** *or `*x*mpl*.*om` m*y ** s*nt to `not

Reasoning

T** vuln*r**ility st*mm** *rom t** *ostn*m* m*t**in* lo*i* in *ut*Tok*ns::**t, w*i** us** *ostn*m*.to_low*r**s*().*n*s_wit*(&t.*ost). T*is *llow** su**ix m*t***s wit*out prop*r *om*in *oun**ry v*li**tion. T** *ommit *i** s*ows t*is lo*i* w*s r*pl****