Miggo Logo

CVE-2024-34346:
Deno permission escalation vulnerability via open of privileged files with missing `--deny` flag

8.5

CVSS Score
3.1

Basic Information

EPSS Score
0.08574%
Published
5/8/2024
Updated
5/8/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
denorust< 1.43.11.43.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient authorization checks in Deno's permission system. The core functions responsible for validating read/write access (check_read and check_write in the permissions module) did not account for privileged OS paths that could bypass sandbox restrictions. These functions allowed operations on sensitive paths with generic --allow-read/--allow-write flags, rather than requiring the stricter --allow-all. The patch explicitly gates these paths behind --allow-all, confirming the vulnerability resided in these permission-checking functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** **no s*n**ox m*y ** un*xp**t**ly w**k*n** *y *llowin* *il* r***/writ* ****ss to privil**** *il*s in v*rious lo**tions on Unix *n* Win*ows pl*t*orms. *or *x*mpl*, r***in* `/pro*/s*l*/*nviron` m*y provi** ****ss *quiv*l*nt to `--*llow-*nv`, *n* wri

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt *ut*oriz*tion ****ks in **no's p*rmission syst*m. T** *or* *un*tions r*sponsi*l* *or v*li**tin* r***/writ* ****ss (****k_r*** *n* ****k_writ* in t** p*rmissions mo*ul*) *i* not ***ount *or privil**** OS p*t*s