Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Deno.env.toObject() ignores the variables listed in --deny-env and returns all environment variables
Vulnerability Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.
CVSS Information
N/A
Vulnerability Type
通过发送数据的信息暴露
Vulnerability Title
Deno 安全漏洞
Vulnerability Description
Deno是Deno开源的一个简单、现代且安全的 JavaScript 和 TypeScript 运行环境。 Deno 2.1.13之前版本和2.2.13之前版本存在安全漏洞,该漏洞源于Deno.env.toObject方法忽略deny-env选项,可能导致敏感信息泄露。
CVSS Information
N/A
Vulnerability Type
N/A