Description
The Deno Standard Library provides APIs for Deno and the Web. Prior to version 1.0.11, `http/file-server`'s `serveDir` with `showDirListing: true` option is vulnerable to cross-site scripting when the attacker is a user who can control file names in the source directory on systems with POSIX file names. Exploitation might also be possible on other systems but less trivial due to e.g. lack of file name support for `<>` in Windows. Version 1.0.11 fixes the issue.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/denoland/std/security/advisories/GHSA-32fx-h446-h8pf
Various Sources x_refsource_misc
https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L507
Various Sources x_refsource_misc
https://github.com/denoland/std/blob/065296ca5a05a47f9741df8f99c32fae4f960070/http/file_server.ts#L532
Scores
CVSS v4
5.1
EPSS
0.0019
EPSS Percentile
40.6%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
denoland/std
< 1.0.11
Published
Nov 22, 2024
Tracked Since
Feb 18, 2026