
Cloud Vulnerability DB
A community-led vulnerabilities database
Deno <=1.14.0 contains a file sandbox vulnerability (CVE-2021-41641) where the sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory, effectively allowing sandbox escape (NVD, AttackerKB).
The vulnerability exists in Deno versions up to and including 1.14.0. The issue stems from improper handling of symbolic links in Deno's file sandbox implementation. The CVSS v3.1 base score is 8.4 HIGH (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N). The vulnerability is classified under CWE-59: Improper Link Resolution Before File Access ('Link Following') (NVD).
When exploited, this vulnerability allows an attacker to bypass Deno's file sandbox restrictions and gain access to any directory on the system, even those outside the permitted write access scope. This represents a significant security boundary failure that could lead to unauthorized access to sensitive files and directories (NVD).
Users should upgrade to a version newer than 1.14.0 to address this vulnerability. No specific workarounds have been documented for users who cannot upgrade immediately (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."