All the vulnerabilites related to vitejs - vite
cve-2023-49293
Vulnerability from cvelistv5
Published
2023-12-04 23:03
Modified
2024-08-02 21:53
Severity ?
EPSS score ?
Summary
Cross-site Scripting in `server.transformIndexHtml` via URL payload in vite
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e=4.4.0, \u003c 4.4.12" }, { "status": "affected", "version": "= 4.5.0" }, { "status": "affected", "version": "\u003e=5.0.0, \u003c 5.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a website frontend framework. When Vite\u0027s HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`\u003cscript type=\"module\"\u003e...\u003c/script\u003e`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: \u0027custom\u0027` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren\u0027t exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-04T23:03:30.752Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97" } ], "source": { "advisory": "GHSA-92r3-m2mg-pj97", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting in `server.transformIndexHtml` via URL payload in vite" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49293", "datePublished": "2023-12-04T23:03:30.752Z", "dateReserved": "2023-11-24T16:45:24.313Z", "dateUpdated": "2024-08-02T21:53:44.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31486
Vulnerability from cvelistv5
Published
2025-04-03 18:24
Modified
2025-04-03 20:39
Severity ?
EPSS score ?
Summary
Vite allows server.fs.deny to be bypassed with .svg or relative paths
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31486", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T20:39:24.672022Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T20:39:28.939Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003c 4.5.12" }, { "status": "affected", "version": "\u003e=5.0.0, \u003c 5.4.17" }, { "status": "affected", "version": "\u003e=6.0.0, \u003c 6.0.14" }, { "status": "affected", "version": "\u003e=6.1.0, \u003c 6.1.4" }, { "status": "affected", "version": "\u003e=6.2.0, \u003c 6.2.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T18:24:39.616Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x" }, { "name": "https://github.com/vitejs/vite/commit/62d7e81ee189d65899bb65f3263ddbd85247b647", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/62d7e81ee189d65899bb65f3263ddbd85247b647" }, { "name": "https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290" } ], "source": { "advisory": "GHSA-xcj6-pq6g-qj4x", "discovery": "UNKNOWN" }, "title": "Vite allows server.fs.deny to be bypassed with .svg or relative paths" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31486", "datePublished": "2025-04-03T18:24:39.616Z", "dateReserved": "2025-03-28T13:36:51.298Z", "dateUpdated": "2025-04-03T20:39:28.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34092
Vulnerability from cvelistv5
Published
2023-06-01 16:29
Modified
2025-01-08 21:13
Severity ?
EPSS score ?
Summary
Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67 | x_refsource_CONFIRM | |
https://github.com/vitejs/vite/pull/13348 | x_refsource_MISC | |
https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67" }, { "name": "https://github.com/vitejs/vite/pull/13348", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/pull/13348" }, { "name": "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34092", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T21:13:03.335508Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T21:13:20.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003c 2.9.16" }, { "status": "affected", "version": "\u003e= 3.0.2, \u003c 3.2.7" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.0.5" }, { "status": "affected", "version": "\u003e= 4.1.0, \u003c 4.1.5" }, { "status": "affected", "version": "\u003e= 4.2.0, \u003c 4.2.3" }, { "status": "affected", "version": "\u003e= 4.3.0, \u003c 4.3.9" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`[\u0027.env\u0027, \u0027.env.*\u0027, \u0027*.{crt,pem}\u0027]`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-50", "description": "CWE-50: Path Equivalence: \u0027//multiple/leading/slash\u0027", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-01T16:29:51.428Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67" }, { "name": "https://github.com/vitejs/vite/pull/13348", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/pull/13348" }, { "name": "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32" } ], "source": { "advisory": "GHSA-353f-5xf4-qw67", "discovery": "UNKNOWN" }, "title": "Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34092", "datePublished": "2023-06-01T16:29:51.428Z", "dateReserved": "2023-05-25T21:56:51.244Z", "dateUpdated": "2025-01-08T21:13:20.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-31207
Vulnerability from cvelistv5
Published
2024-04-04 15:51
Modified
2024-08-02 01:46
Severity ?
EPSS score ?
Summary
Vite's `server.fs.deny` did not deny requests for patterns with directories
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-31207", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-04T17:23:36.781933Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:36:11.128Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:04.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g" }, { "name": "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0" }, { "name": "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48" }, { "name": "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67" }, { "name": "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9" }, { "name": "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258" }, { "name": "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 2.7.0, \u003c= 2.9.17" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c= 3.2.8" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c= 4.5.2" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c= 5.0.12" }, { "status": "affected", "version": "\u003e= 5.1.0, \u003c= 5.1.6" }, { "status": "affected", "version": "\u003e= 5.2.0, \u003c= 5.2.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite (French word for \"quick\", pronounced /vit/, like \"veet\") is a frontend build tooling to improve the frontend development experience.`server.fs.deny` does not deny requests for patterns with directories. This vulnerability has been patched in version(s) 5.2.6, 5.1.7, 5.0.13, 4.5.3, 3.2.10 and 2.9.18." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-04T15:51:54.683Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g" }, { "name": "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0" }, { "name": "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48" }, { "name": "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67" }, { "name": "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9" }, { "name": "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258" }, { "name": "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649" } ], "source": { "advisory": "GHSA-8jhw-289h-jh2g", "discovery": "UNKNOWN" }, "title": "Vite\u0027s `server.fs.deny` did not deny requests for patterns with directories" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31207", "datePublished": "2024-04-04T15:51:54.683Z", "dateReserved": "2024-03-29T14:16:31.900Z", "dateUpdated": "2024-08-02T01:46:04.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23331
Vulnerability from cvelistv5
Published
2024-01-19 19:43
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw | x_refsource_CONFIRM | |
https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5 | x_refsource_MISC | |
https://vitejs.dev/config/server-options.html#server-fs-deny | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw" }, { "name": "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5" }, { "name": "https://vitejs.dev/config/server-options.html#server-fs-deny", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vitejs.dev/config/server-options.html#server-fs-deny" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e=2.7.0, \u003c 2.9.17" }, { "status": "affected", "version": "\u003e=3.0.0, \u003c3.2.8" }, { "status": "affected", "version": "\u003e=4.0.0, \u003c 4.5.2" }, { "status": "affected", "version": "\u003e=5.0.0, \u003c 5.0.12" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn\u0027t discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-178", "description": "CWE-178: Improper Handling of Case Sensitivity", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-19T19:43:17.404Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw" }, { "name": "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5" }, { "name": "https://vitejs.dev/config/server-options.html#server-fs-deny", "tags": [ "x_refsource_MISC" ], "url": "https://vitejs.dev/config/server-options.html#server-fs-deny" } ], "source": { "advisory": "GHSA-c24v-8rfc-w8vw", "discovery": "UNKNOWN" }, "title": "Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23331", "datePublished": "2024-01-19T19:43:17.404Z", "dateReserved": "2024-01-15T15:19:19.442Z", "dateUpdated": "2024-08-01T22:59:32.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-30208
Vulnerability from cvelistv5
Published
2025-03-24 17:03
Modified
2025-03-24 17:46
Severity ?
EPSS score ?
Summary
Vite bypasses server.fs.deny when using `?raw??`
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30208", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-24T17:40:42.736527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-24T17:46:37.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003c 4.5.10" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.4.15" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.0.12" }, { "status": "affected", "version": "\u003e= 6.1.0, \u003c 6.1.2" }, { "status": "affected", "version": "\u003e= 6.2.0, \u003c 6.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import\u0026raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-24T17:03:40.728Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w" }, { "name": "https://github.com/vitejs/vite/commit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4" }, { "name": "https://github.com/vitejs/vite/commit/80381c38d6f068b12e6e928cd3c616bd1d64803c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/80381c38d6f068b12e6e928cd3c616bd1d64803c" }, { "name": "https://github.com/vitejs/vite/commit/807d7f06d33ab49c48a2a3501da3eea1906c0d41", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/807d7f06d33ab49c48a2a3501da3eea1906c0d41" }, { "name": "https://github.com/vitejs/vite/commit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca" }, { "name": "https://github.com/vitejs/vite/commit/f234b5744d8b74c95535a7b82cc88ed2144263c1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/f234b5744d8b74c95535a7b82cc88ed2144263c1" } ], "source": { "advisory": "GHSA-x574-m823-4x7w", "discovery": "UNKNOWN" }, "title": "Vite bypasses server.fs.deny when using `?raw??`" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30208", "datePublished": "2025-03-24T17:03:40.728Z", "dateReserved": "2025-03-18T18:15:13.849Z", "dateUpdated": "2025-03-24T17:46:37.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35204
Vulnerability from cvelistv5
Published
2022-08-18 18:15
Modified
2024-08-03 09:29
Severity ?
EPSS score ?
Summary
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/issues/8498 | x_refsource_MISC | |
https://github.com/vitejs/vite/releases/tag/v2.9.13 | x_refsource_MISC | |
https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:29:17.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/issues/8498" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/releases/tag/v2.9.13" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim\u0027s service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-18T18:14:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/issues/8498" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/releases/tag/v2.9.13" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-35204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim\u0027s service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vitejs/vite/issues/8498", "refsource": "MISC", "url": "https://github.com/vitejs/vite/issues/8498" }, { "name": "https://github.com/vitejs/vite/releases/tag/v2.9.13", "refsource": "MISC", "url": "https://github.com/vitejs/vite/releases/tag/v2.9.13" }, { "name": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4", "refsource": "MISC", "url": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35204", "datePublished": "2022-08-18T18:15:21", "dateReserved": "2022-07-04T00:00:00", "dateUpdated": "2024-08-03T09:29:17.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45811
Vulnerability from cvelistv5
Published
2024-09-17 20:08
Modified
2024-09-18 14:06
Severity ?
EPSS score ?
Summary
server.fs.deny bypassed when using ?import&raw in vite
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-9cwx-2883-4wfx | x_refsource_CONFIRM | |
https://github.com/vitejs/vite/commit/6820bb3b9a54334f3268fc5ee1e967d2e1c0db34 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*" ], "defaultStatus": "unknown", "product": "vite", "vendor": "vitejs", "versions": [ { "lessThan": "5.4.6", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "5.3.6", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.2.14", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThan": "4.5.5", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "3.2.11", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45811", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:59:58.812671Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:06:21.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.6" }, { "status": "affected", "version": "\u003e= 5.3.0, \u003c 5.3.6" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.2.14" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.5.5" }, { "status": "affected", "version": "\u003c 3.2.11" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import\u0026raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T20:08:11.801Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-9cwx-2883-4wfx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-9cwx-2883-4wfx" }, { "name": "https://github.com/vitejs/vite/commit/6820bb3b9a54334f3268fc5ee1e967d2e1c0db34", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/6820bb3b9a54334f3268fc5ee1e967d2e1c0db34" } ], "source": { "advisory": "GHSA-9cwx-2883-4wfx", "discovery": "UNKNOWN" }, "title": "server.fs.deny bypassed when using ?import\u0026raw in vite" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45811", "datePublished": "2024-09-17T20:08:11.801Z", "dateReserved": "2024-09-09T14:23:07.505Z", "dateUpdated": "2024-09-18T14:06:21.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-31125
Vulnerability from cvelistv5
Published
2025-03-31 17:06
Modified
2025-03-31 17:59
Severity ?
EPSS score ?
Summary
Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8 | x_refsource_CONFIRM | |
https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31125", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T17:59:19.450898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T17:59:26.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 6.2.0, \u003c 6.2.4" }, { "status": "affected", "version": "\u003e= 6.1.0, \u003c 6.1.3" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.0.13" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.4.16" }, { "status": "affected", "version": "\u003c 4.5.11" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline\u0026import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T17:31:51.583Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8" }, { "name": "https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949" } ], "source": { "advisory": "GHSA-4r4m-qw57-chr8", "discovery": "UNKNOWN" }, "title": "Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31125", "datePublished": "2025-03-31T17:06:30.704Z", "dateReserved": "2025-03-26T15:04:52.626Z", "dateUpdated": "2025-03-31T17:59:26.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-32395
Vulnerability from cvelistv5
Published
2025-04-10 13:25
Modified
2025-04-10 14:14
Severity ?
EPSS score ?
Summary
Vite has an `server.fs.deny` bypass with an invalid `request-target`
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4 | x_refsource_CONFIRM | |
https://github.com/vitejs/vite/commit/175a83909f02d3b554452a7bd02b9f340cdfef70 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32395", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-10T14:14:30.473382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-10T14:14:40.591Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 6.2.0, \u003c 6.2.6" }, { "status": "affected", "version": "\u003e= 6.1.0, \u003c 6.1.5" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.0.15" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.4.18" }, { "status": "affected", "version": "\u003c 4.5.13" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. Prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, the contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2. On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won\u0027t contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) and running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun) are affected. This vulnerability is fixed in 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 6, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T13:25:19.177Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-356w-63v5-8wf4" }, { "name": "https://github.com/vitejs/vite/commit/175a83909f02d3b554452a7bd02b9f340cdfef70", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/175a83909f02d3b554452a7bd02b9f340cdfef70" } ], "source": { "advisory": "GHSA-356w-63v5-8wf4", "discovery": "UNKNOWN" }, "title": "Vite has an `server.fs.deny` bypass with an invalid `request-target`" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-32395", "datePublished": "2025-04-10T13:25:19.177Z", "dateReserved": "2025-04-06T19:46:02.464Z", "dateUpdated": "2025-04-10T14:14:40.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45812
Vulnerability from cvelistv5
Published
2024-09-17 20:08
Modified
2024-09-18 13:59
Severity ?
EPSS score ?
Summary
DOM Clobbering gadget found in vite bundled scripts that leads to XSS in Vite
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3 | x_refsource_CONFIRM | |
https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986 | x_refsource_MISC | |
https://github.com/vitejs/vite/commit/ade1d89660e17eedfd35652165b0c26905259fad | x_refsource_MISC | |
https://research.securitum.com/xss-in-amp4email-dom-clobbering | x_refsource_MISC | |
https://scnps.co/papers/sp23_domclob.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*" ], "defaultStatus": "unknown", "product": "vite", "vendor": "vitejs", "versions": [ { "lessThan": "5.4.6", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "5.3.6", "status": "affected", "version": "5.3.0", "versionType": "custom" }, { "lessThan": "5.2.14", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThan": "4.5.5", "status": "affected", "version": "4.0.0", "versionType": "custom" }, { "lessThan": "3.2.11", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45812", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:57:07.046459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:59:14.314Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 5.4.0, \u003c 5.4.6" }, { "status": "affected", "version": "\u003e= 5.3.0, \u003c 5.3.6" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.2.14" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.5.5" }, { "status": "affected", "version": "\u003c 3.2.11" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite a frontend build tooling framework for javascript. Affected versions of vite were discovered to contain a DOM Clobbering vulnerability when building scripts to `cjs`/`iife`/`umd` output format. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. We have identified a DOM Clobbering vulnerability in Vite bundled scripts, particularly when the scripts dynamically import other scripts from the assets folder and the developer sets the build output format to `cjs`, `iife`, or `umd`. In such cases, Vite replaces relative paths starting with `__VITE_ASSET__` using the URL retrieved from `document.currentScript`. However, this implementation is vulnerable to a DOM Clobbering attack. The `document.currentScript` lookup can be shadowed by an attacker via the browser\u0027s named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server. This vulnerability can result in cross-site scripting (XSS) attacks on websites that include Vite-bundled files (configured with an output format of `cjs`, `iife`, or `umd`) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T20:08:13.372Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3" }, { "name": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986" }, { "name": "https://github.com/vitejs/vite/commit/ade1d89660e17eedfd35652165b0c26905259fad", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vitejs/vite/commit/ade1d89660e17eedfd35652165b0c26905259fad" }, { "name": "https://research.securitum.com/xss-in-amp4email-dom-clobbering", "tags": [ "x_refsource_MISC" ], "url": "https://research.securitum.com/xss-in-amp4email-dom-clobbering" }, { "name": "https://scnps.co/papers/sp23_domclob.pdf", "tags": [ "x_refsource_MISC" ], "url": "https://scnps.co/papers/sp23_domclob.pdf" } ], "source": { "advisory": "GHSA-64vr-g452-qvp3", "discovery": "UNKNOWN" }, "title": "DOM Clobbering gadget found in vite bundled scripts that leads to XSS in Vite" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45812", "datePublished": "2024-09-17T20:08:13.372Z", "dateReserved": "2024-09-09T14:23:07.505Z", "dateUpdated": "2024-09-18T13:59:14.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-24010
Vulnerability from cvelistv5
Published
2025-01-20 15:53
Modified
2025-01-21 14:52
Severity ?
EPSS score ?
Summary
Vite allows any websites to send any requests to the development server and read the response
References
▼ | URL | Tags |
---|---|---|
https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24010", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T14:52:46.258360Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-21T14:52:53.680Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "vite", "vendor": "vitejs", "versions": [ { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.0.9" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.4.12" }, { "status": "affected", "version": "\u003c 4.5.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346: Origin Validation Error", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-350", "description": "CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1385", "description": "CWE-1385: Missing Origin Validation in WebSockets", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-20T15:53:30.929Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6" } ], "source": { "advisory": "GHSA-vg6x-rcgg-rjx6", "discovery": "UNKNOWN" }, "title": "Vite allows any websites to send any requests to the development server and read the response" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-24010", "datePublished": "2025-01-20T15:53:30.929Z", "dateReserved": "2025-01-16T17:31:06.457Z", "dateUpdated": "2025-01-21T14:52:53.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }