CVE-2024-52793 Vulnerability Details

  /     /     /  

CVE-2024-52793 Metadata Quick Info

CVE Published: 22/11/2024 | CVE Updated: 26/11/2024 | CVE Year: 2024
Source: GitHub_M | Vendor: denoland | Product: std
Status : PUBLISHED

CVE-2024-52793 Description

The Deno Standard Library provides APIs for Deno and the Web. Prior to version 1.0.11, `http/file-server`\'s `serveDir` with `showDirListing: true` option is vulnerable to cross-site scripting when the attacker is a user who can control file names in the source directory on systems with POSIX file names. Exploitation might also be possible on other systems but less trivial due to e.g. lack of file name support for `<>` in Windows. Version 1.0.11 fixes the issue.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-79
CWE Name: CWE-79: Improper Neutralization of Input During Web Page Generation ( Cross-site Scripting )
Source: denoland

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).