deno is vulnerable to Improper Input Validation
68
Medium Risk
Affected versions of this package are vulnerable to an improper network permission bypass where deny rules could be evaded by using alternative representations of the same IP address, such as IPv4-mapped IPv6 addresses or numeric hostname aliases that resolve to denied addresses. This may allow restricted connections to hosts like localhost or denied subnets despite explicit deny-net rules. An attacker might exploit this by supplying a blocked target in decimal, hexadecimal, or IPv4-mapped IPv6 form (for example, 2130706433, 0x7f000001, or ::ffff:127.0.0.1) to reach internal services, localhost-only ports, or other protected network resources that should have been denied.
You are affected if you are using a version that falls within the vulnerable range.
deno is vulnerable to Improper Input Validation in versions 1.42.4 - 2.7.11.
Upgrade the deno library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant