Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-34092


Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in [email protected], [email protected], [email protected], [email protected], [email protected], and [email protected].


Published

2023-06-01T17:15:10.947

Last Modified

2024-11-21T08:06:31.573

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-50
    CWE-200
  • Type: Primary
    CWE-706

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application vitejs vite < 3.2.7 Yes
Application vitejs vite < 4.0.5 Yes
Application vitejs vite < 4.1.5 Yes
Application vitejs vite < 4.2.3 Yes
Application vitejs vite < 4.3.9 Yes
Application vitejs vite 2.9.15 Yes

References