Vulnerabilites related to vitejs - vite
Vulnerability from fkie_nvd
Published
2024-01-19 20:15
Modified
2024-11-21 08:57
Summary
Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.
Impacted products
Vendor Product Version
vitejs vite *
vitejs vite *
vitejs vite *
vitejs vite *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "CA6E1BE3-E530-4BB3-8086-856A30ECC2AA",
                     versionEndExcluding: "2.9.17",
                     versionStartIncluding: "2.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "C09B4AF4-B3E4-457D-A5DB-CAB25D164084",
                     versionEndExcluding: "3.2.8",
                     versionStartIncluding: "3.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "78A4B866-994A-4B61-80AC-DDBCB478C66E",
                     versionEndExcluding: "4.5.2",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "5A0695F1-5643-4269-94C7-29F156D936F8",
                     versionEndExcluding: "5.0.12",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.",
      },
      {
         lang: "es",
         value: "Vite es un framework de herramientas frontend para javascript. La opción del servidor de desarrollo de Vite `server.fs.deny` se puede omitir en sistemas de archivos que no distinguen entre mayúsculas y minúsculas utilizando versiones de nombres de archivos aumentadas entre mayúsculas y minúsculas. Cabe destacar que esto afecta a los servidores alojados en Windows. Esta omisión es similar a CVE-2023-34092, con un área de superficie reducida para hosts que tienen sistemas de archivos que no distinguen entre mayúsculas y minúsculas. Dado que `picomatch` por defecto utiliza coincidencias globales que distinguen entre mayúsculas y minúsculas, pero el servidor de archivos no discrimina; es posible omitir la lista negra. Al solicitar rutas de sistema de archivos sin formato usando mayúsculas aumentadas, el comparador derivado de `config.server.fs.deny` no logra bloquear el acceso a archivos confidenciales. Este problema se ha solucionado en vite@5.0.12, vite@4.5.2, vite@3.2.8 y vite@2.9.17. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben restringir el acceso a los servidores de desarrollo.",
      },
   ],
   id: "CVE-2024-23331",
   lastModified: "2024-11-21T08:57:31.573",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-19T20:15:14.070",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Product",
         ],
         url: "https://vitejs.dev/config/server-options.html#server-fs-deny",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://vitejs.dev/config/server-options.html#server-fs-deny",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-178",
            },
            {
               lang: "en",
               value: "CWE-200",
            },
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "security-advisories@github.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-01 17:15
Modified
2024-11-21 08:06
Summary
Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.
Impacted products
Vendor Product Version
vitejs vite *
vitejs vite *
vitejs vite *
vitejs vite *
vitejs vite *
vitejs vite 2.9.15



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "81E9D1EB-AFE2-43D9-A781-282140779EBF",
                     versionEndExcluding: "3.2.7",
                     versionStartIncluding: "3.0.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "9A9DC92A-6C2A-48BC-B6B2-365E1589131F",
                     versionEndExcluding: "4.0.5",
                     versionStartIncluding: "4.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "3885C89E-1319-458B-9497-95485DD45953",
                     versionEndExcluding: "4.1.5",
                     versionStartIncluding: "4.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "B0F04F02-C6BA-4BFB-ACD6-96CBF811BB5E",
                     versionEndExcluding: "4.2.3",
                     versionStartIncluding: "4.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "3628D78A-7E86-490F-961F-9C3F538FBCEE",
                     versionEndExcluding: "4.3.9",
                     versionStartIncluding: "4.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:2.9.15:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "25EB63DE-73B0-4901-959E-FFF4FAD2CDE5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.",
      },
   ],
   id: "CVE-2023-34092",
   lastModified: "2024-11-21T08:06:31.573",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-01T17:15:10.947",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/pull/13348",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/vitejs/vite/pull/13348",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-50",
            },
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-706",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-12-04 23:15
Modified
2024-11-21 08:33
Summary
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
vitejs vite *
vitejs vite *
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0
vitejs vite 5.0.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "794F0A24-E042-454A-8AF4-410CA6B9B7ED",
                     versionEndIncluding: "4.4.11",
                     versionStartIncluding: "4.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "5035825C-DE1D-4C3E-B80A-B80BAA9B9B83",
                     versionEndIncluding: "5.0.4",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:-:*:*:*:node.js:*:*",
                     matchCriteriaId: "49DB9151-3306-4887-B467-54BF1CB59077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta0:*:*:*:node.js:*:*",
                     matchCriteriaId: "AD12B845-C230-4731-A1C3-F7C8563EC330",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta1:*:*:*:node.js:*:*",
                     matchCriteriaId: "71B39887-494A-42B0-97B5-3A27BBDA384F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta10:*:*:*:node.js:*:*",
                     matchCriteriaId: "42748778-8084-4E85-A870-F4938B2B4197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta11:*:*:*:node.js:*:*",
                     matchCriteriaId: "8CEA9A64-2C3B-48CD-B553-1B266E6D98DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta12:*:*:*:node.js:*:*",
                     matchCriteriaId: "C4335B97-76B1-4B91-BDF1-0DFFB8B5D966",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta13:*:*:*:node.js:*:*",
                     matchCriteriaId: "D4393D1C-F71A-4FBB-896E-91F5BDE99F5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta14:*:*:*:node.js:*:*",
                     matchCriteriaId: "41F91182-DFB5-4900-967A-3467C1160FD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta15:*:*:*:node.js:*:*",
                     matchCriteriaId: "E3A2BCC8-1B86-47D9-B1D9-374B3FAF452F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta16:*:*:*:node.js:*:*",
                     matchCriteriaId: "659D1924-3224-4F96-B88C-1A98909C3129",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta17:*:*:*:node.js:*:*",
                     matchCriteriaId: "239A48C0-7571-46A9-ADF8-8044F89312DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta18:*:*:*:node.js:*:*",
                     matchCriteriaId: "0DBF0C24-7E51-4E33-B265-872250BAAFFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta19:*:*:*:node.js:*:*",
                     matchCriteriaId: "061FD0EC-C333-43A4-B003-0B2C7CC5F377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta2:*:*:*:node.js:*:*",
                     matchCriteriaId: "CDAA6C11-11F8-466A-910F-CEB4ECA6C2B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta20:*:*:*:node.js:*:*",
                     matchCriteriaId: "E3FE8672-FB0B-4E18-8830-85A858B4EBCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta3:*:*:*:node.js:*:*",
                     matchCriteriaId: "9DBA3329-186A-48FD-A1F1-0F0F4487FEB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta4:*:*:*:node.js:*:*",
                     matchCriteriaId: "A4C137DE-8111-447B-AB2A-5DCF19C1EDE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta5:*:*:*:node.js:*:*",
                     matchCriteriaId: "1866630A-7067-4B2D-BB66-FA5A49556046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta6:*:*:*:node.js:*:*",
                     matchCriteriaId: "0490F00F-EE92-4A86-A11F-7A81345700AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta7:*:*:*:node.js:*:*",
                     matchCriteriaId: "F7947662-99E7-42FA-9F5B-FBB84B370E76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta8:*:*:*:node.js:*:*",
                     matchCriteriaId: "DC5DF679-2F1D-4DDC-AD63-D4013D61D5F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:5.0.0:beta9:*:*:*:node.js:*:*",
                     matchCriteriaId: "D3EE21DD-285A-4B6A-A607-60D4E3842B28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type=\"module\">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.",
      },
      {
         lang: "es",
         value: "Vite es un framework de interfaz de sitio web. Cuando la transformación HTML de Vite se invoca manualmente a través de `server.transformIndexHtml`, la URL de solicitud original se pasa sin modificar y el `html` que se transforma contiene scripts de módulo en línea (``), es posible inyectar HTML arbitrario en la salida transformada proporcionando una cadena de consulta URL maliciosa a `server.transformIndexHtml`. Solo se ven afectadas las aplicaciones que usan `appType: 'custom'` y usan el middleware HTML predeterminado de Vite. La entrada HTML también debe contener un script en línea. El ataque requiere que un usuario haga clic en una URL maliciosa mientras ejecuta el servidor de desarrollo. Los archivos restringidos no están expuestos al atacante. Este problema se ha solucionado en vite@5.0.5, vite@4.5.1 y vite@4.4.12. No se conocen workarounds para esta vulnerabilidad.",
      },
   ],
   id: "CVE-2023-49293",
   lastModified: "2024-11-21T08:33:12.293",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-12-04T23:15:27.730",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "security-advisories@github.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-08-18 19:15
Modified
2024-11-21 07:10
Summary
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
Impacted products
Vendor Product Version
vitejs vite *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                     matchCriteriaId: "BA74D018-9C42-4064-99A8-59E31BAB5856",
                     versionEndExcluding: "2.9.13",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.",
      },
      {
         lang: "es",
         value: "Se ha detectado que Vitejs Vite versiones anteriores a v2.9.13, permitía a atacantes llevar a cabo un salto de directorio por medio de una URL diseñada al servicio de la víctima.",
      },
   ],
   id: "CVE-2022-35204",
   lastModified: "2024-11-21T07:10:53.847",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-08-18T19:15:14.550",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/issues/8498",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/issues/8498",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
            "Third Party Advisory",
         ],
         url: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2025-31125
Vulnerability from cvelistv5
Published
2025-03-31 17:06
Modified
2025-03-31 17:59
Summary
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.
Impacted products
Vendor Product Version
vitejs vite Version: >= 6.2.0, < 6.2.4
Version: >= 6.1.0, < 6.1.3
Version: >= 6.0.0, < 6.0.13
Version: >= 5.0.0, < 5.4.16
Version: < 4.5.11
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-31125",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-31T17:59:19.450898Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-31T17:59:26.675Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            references: [
               {
                  tags: [
                     "exploit",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8",
               },
            ],
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">= 6.2.0, < 6.2.4",
                  },
                  {
                     status: "affected",
                     version: ">= 6.1.0, < 6.1.3",
                  },
                  {
                     status: "affected",
                     version: ">= 6.0.0, < 6.0.13",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, < 5.4.16",
                  },
                  {
                     status: "affected",
                     version: "< 4.5.11",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-31T17:31:51.583Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8",
            },
            {
               name: "https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949",
            },
         ],
         source: {
            advisory: "GHSA-4r4m-qw57-chr8",
            discovery: "UNKNOWN",
         },
         title: "Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2025-31125",
      datePublished: "2025-03-31T17:06:30.704Z",
      dateReserved: "2025-03-26T15:04:52.626Z",
      dateUpdated: "2025-03-31T17:59:26.675Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-49293
Vulnerability from cvelistv5
Published
2023-12-04 23:03
Modified
2024-08-02 21:53
Summary
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
vitejs vite Version: >=4.4.0, < 4.4.12
Version: = 4.5.0
Version: >=5.0.0, < 5.0.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:53:44.657Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">=4.4.0, < 4.4.12",
                  },
                  {
                     status: "affected",
                     version: "= 4.5.0",
                  },
                  {
                     status: "affected",
                     version: ">=5.0.0, < 5.0.5",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type=\"module\">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-04T23:03:30.752Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97",
            },
         ],
         source: {
            advisory: "GHSA-92r3-m2mg-pj97",
            discovery: "UNKNOWN",
         },
         title: "Cross-site Scripting in `server.transformIndexHtml` via URL payload in vite",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2023-49293",
      datePublished: "2023-12-04T23:03:30.752Z",
      dateReserved: "2023-11-24T16:45:24.313Z",
      dateUpdated: "2024-08-02T21:53:44.657Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-24010
Vulnerability from cvelistv5
Published
2025-01-20 15:53
Modified
2025-01-21 14:52
Summary
Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6.
Impacted products
Vendor Product Version
vitejs vite Version: >= 6.0.0, < 6.0.9
Version: >= 5.0.0, < 5.4.12
Version: < 4.5.6
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-24010",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-21T14:52:46.258360Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-21T14:52:53.680Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">= 6.0.0, < 6.0.9",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, < 5.4.12",
                  },
                  {
                     status: "affected",
                     version: "< 4.5.6",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-346",
                     description: "CWE-346: Origin Validation Error",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-350",
                     description: "CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-1385",
                     description: "CWE-1385: Missing Origin Validation in WebSockets",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-20T15:53:30.929Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-vg6x-rcgg-rjx6",
            },
         ],
         source: {
            advisory: "GHSA-vg6x-rcgg-rjx6",
            discovery: "UNKNOWN",
         },
         title: "Vite allows any websites to send any requests to the development server and read the response",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2025-24010",
      datePublished: "2025-01-20T15:53:30.929Z",
      dateReserved: "2025-01-16T17:31:06.457Z",
      dateUpdated: "2025-01-21T14:52:53.680Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-35204
Vulnerability from cvelistv5
Published
2022-08-18 18:15
Modified
2024-08-03 09:29
Severity ?
Summary
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T09:29:17.456Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/issues/8498",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-08-18T18:14:57",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/issues/8498",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2022-35204",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/vitejs/vite/issues/8498",
                     refsource: "MISC",
                     url: "https://github.com/vitejs/vite/issues/8498",
                  },
                  {
                     name: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
                     refsource: "MISC",
                     url: "https://github.com/vitejs/vite/releases/tag/v2.9.13",
                  },
                  {
                     name: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
                     refsource: "MISC",
                     url: "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-35204",
      datePublished: "2022-08-18T18:15:21",
      dateReserved: "2022-07-04T00:00:00",
      dateUpdated: "2024-08-03T09:29:17.456Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-45811
Vulnerability from cvelistv5
Published
2024-09-17 20:08
Modified
2024-09-18 14:06
Summary
Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import&raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
vitejs vite Version: >= 5.4.0, < 5.4.6
Version: >= 5.3.0, < 5.3.6
Version: >= 5.0.0, < 5.2.14
Version: >= 4.0.0, < 4.5.5
Version: < 3.2.11
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "vite",
                  vendor: "vitejs",
                  versions: [
                     {
                        lessThan: "5.4.6",
                        status: "affected",
                        version: "5.4.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.3.6",
                        status: "affected",
                        version: "5.3.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.2.14",
                        status: "affected",
                        version: "5.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.5.5",
                        status: "affected",
                        version: "4.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "3.2.11",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-45811",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-18T13:59:58.812671Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-18T14:06:21.732Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">= 5.4.0, < 5.4.6",
                  },
                  {
                     status: "affected",
                     version: ">= 5.3.0, < 5.3.6",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, < 5.2.14",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0, < 4.5.5",
                  },
                  {
                     status: "affected",
                     version: "< 3.2.11",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import&raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-17T20:08:11.801Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-9cwx-2883-4wfx",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-9cwx-2883-4wfx",
            },
            {
               name: "https://github.com/vitejs/vite/commit/6820bb3b9a54334f3268fc5ee1e967d2e1c0db34",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/6820bb3b9a54334f3268fc5ee1e967d2e1c0db34",
            },
         ],
         source: {
            advisory: "GHSA-9cwx-2883-4wfx",
            discovery: "UNKNOWN",
         },
         title: "server.fs.deny bypassed when using ?import&raw in vite",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-45811",
      datePublished: "2024-09-17T20:08:11.801Z",
      dateReserved: "2024-09-09T14:23:07.505Z",
      dateUpdated: "2024-09-18T14:06:21.732Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-31486
Vulnerability from cvelistv5
Published
2025-04-03 18:24
Modified
2025-04-03 20:39
Summary
Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5.
Impacted products
Vendor Product Version
vitejs vite Version: < 4.5.12
Version: >=5.0.0, < 5.4.17
Version: >=6.0.0, < 6.0.14
Version: >=6.1.0, < 6.1.4
Version: >=6.2.0, < 6.2.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-31486",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-03T20:39:24.672022Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-03T20:39:28.939Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            references: [
               {
                  tags: [
                     "exploit",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x",
               },
            ],
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: "< 4.5.12",
                  },
                  {
                     status: "affected",
                     version: ">=5.0.0, < 5.4.17",
                  },
                  {
                     status: "affected",
                     version: ">=6.0.0, < 6.0.14",
                  },
                  {
                     status: "affected",
                     version: ">=6.1.0, < 6.1.4",
                  },
                  {
                     status: "affected",
                     version: ">=6.2.0, < 6.2.5",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-03T18:24:39.616Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x",
            },
            {
               name: "https://github.com/vitejs/vite/commit/62d7e81ee189d65899bb65f3263ddbd85247b647",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/62d7e81ee189d65899bb65f3263ddbd85247b647",
            },
            {
               name: "https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290",
            },
         ],
         source: {
            advisory: "GHSA-xcj6-pq6g-qj4x",
            discovery: "UNKNOWN",
         },
         title: "Vite allows server.fs.deny to be bypassed with .svg or relative paths",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2025-31486",
      datePublished: "2025-04-03T18:24:39.616Z",
      dateReserved: "2025-03-28T13:36:51.298Z",
      dateUpdated: "2025-04-03T20:39:28.939Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-23331
Vulnerability from cvelistv5
Published
2024-01-19 19:43
Modified
2024-08-01 22:59
Summary
Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.
Impacted products
Vendor Product Version
vitejs vite Version: >=2.7.0, < 2.9.17
Version: >=3.0.0, <3.2.8
Version: >=4.0.0, < 4.5.2
Version: >=5.0.0, < 5.0.12
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:59:32.203Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
               },
               {
                  name: "https://vitejs.dev/config/server-options.html#server-fs-deny",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://vitejs.dev/config/server-options.html#server-fs-deny",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">=2.7.0, < 2.9.17",
                  },
                  {
                     status: "affected",
                     version: ">=3.0.0, <3.2.8",
                  },
                  {
                     status: "affected",
                     version: ">=4.0.0, < 4.5.2",
                  },
                  {
                     status: "affected",
                     version: ">=5.0.0, < 5.0.12",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-178",
                     description: "CWE-178: Improper Handling of Case Sensitivity",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-19T19:43:17.404Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw",
            },
            {
               name: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5",
            },
            {
               name: "https://vitejs.dev/config/server-options.html#server-fs-deny",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://vitejs.dev/config/server-options.html#server-fs-deny",
            },
         ],
         source: {
            advisory: "GHSA-c24v-8rfc-w8vw",
            discovery: "UNKNOWN",
         },
         title: "Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-23331",
      datePublished: "2024-01-19T19:43:17.404Z",
      dateReserved: "2024-01-15T15:19:19.442Z",
      dateUpdated: "2024-08-01T22:59:32.203Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-34092
Vulnerability from cvelistv5
Published
2023-06-01 16:29
Modified
2025-01-08 21:13
Summary
Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.
Impacted products
Vendor Product Version
vitejs vite Version: < 2.9.16
Version: >= 3.0.2, < 3.2.7
Version: >= 4.0.0, < 4.0.5
Version: >= 4.1.0, < 4.1.5
Version: >= 4.2.0, < 4.2.3
Version: >= 4.3.0, < 4.3.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:01:53.638Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
               },
               {
                  name: "https://github.com/vitejs/vite/pull/13348",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/pull/13348",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-34092",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-08T21:13:03.335508Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-08T21:13:20.258Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: "< 2.9.16",
                  },
                  {
                     status: "affected",
                     version: ">= 3.0.2, < 3.2.7",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0, < 4.0.5",
                  },
                  {
                     status: "affected",
                     version: ">= 4.1.0, < 4.1.5",
                  },
                  {
                     status: "affected",
                     version: ">= 4.2.0, < 4.2.3",
                  },
                  {
                     status: "affected",
                     version: ">= 4.3.0, < 4.3.9",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-50",
                     description: "CWE-50: Path Equivalence: '//multiple/leading/slash'",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-01T16:29:51.428Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67",
            },
            {
               name: "https://github.com/vitejs/vite/pull/13348",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/pull/13348",
            },
            {
               name: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/813ddd6155c3d54801e264ba832d8347f6f66b32",
            },
         ],
         source: {
            advisory: "GHSA-353f-5xf4-qw67",
            discovery: "UNKNOWN",
         },
         title: "Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2023-34092",
      datePublished: "2023-06-01T16:29:51.428Z",
      dateReserved: "2023-05-25T21:56:51.244Z",
      dateUpdated: "2025-01-08T21:13:20.258Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2025-30208
Vulnerability from cvelistv5
Published
2025-03-24 17:03
Modified
2025-03-24 17:46
Summary
Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.
Impacted products
Vendor Product Version
vitejs vite Version: < 4.5.10
Version: >= 5.0.0, < 5.4.15
Version: >= 6.0.0, < 6.0.12
Version: >= 6.1.0, < 6.1.2
Version: >= 6.2.0, < 6.2.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-30208",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-24T17:40:42.736527Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-24T17:46:37.205Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: "< 4.5.10",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, < 5.4.15",
                  },
                  {
                     status: "affected",
                     version: ">= 6.0.0, < 6.0.12",
                  },
                  {
                     status: "affected",
                     version: ">= 6.1.0, < 6.1.2",
                  },
                  {
                     status: "affected",
                     version: ">= 6.2.0, < 6.2.3",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-24T17:03:40.728Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w",
            },
            {
               name: "https://github.com/vitejs/vite/commit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/315695e9d97cc6cfa7e6d9e0229fb50cdae3d9f4",
            },
            {
               name: "https://github.com/vitejs/vite/commit/80381c38d6f068b12e6e928cd3c616bd1d64803c",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/80381c38d6f068b12e6e928cd3c616bd1d64803c",
            },
            {
               name: "https://github.com/vitejs/vite/commit/807d7f06d33ab49c48a2a3501da3eea1906c0d41",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/807d7f06d33ab49c48a2a3501da3eea1906c0d41",
            },
            {
               name: "https://github.com/vitejs/vite/commit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/92ca12dc79118bf66f2b32ff81ed09e0d0bd07ca",
            },
            {
               name: "https://github.com/vitejs/vite/commit/f234b5744d8b74c95535a7b82cc88ed2144263c1",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/f234b5744d8b74c95535a7b82cc88ed2144263c1",
            },
         ],
         source: {
            advisory: "GHSA-x574-m823-4x7w",
            discovery: "UNKNOWN",
         },
         title: "Vite bypasses server.fs.deny when using `?raw??`",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2025-30208",
      datePublished: "2025-03-24T17:03:40.728Z",
      dateReserved: "2025-03-18T18:15:13.849Z",
      dateUpdated: "2025-03-24T17:46:37.205Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-31207
Vulnerability from cvelistv5
Published
2024-04-04 15:51
Modified
2024-08-02 01:46
Summary
Vite (French word for "quick", pronounced /vit/, like "veet") is a frontend build tooling to improve the frontend development experience.`server.fs.deny` does not deny requests for patterns with directories. This vulnerability has been patched in version(s) 5.2.6, 5.1.7, 5.0.13, 4.5.3, 3.2.10 and 2.9.18.
Impacted products
Vendor Product Version
vitejs vite Version: >= 2.7.0, <= 2.9.17
Version: >= 3.0.0, <= 3.2.8
Version: >= 4.0.0, <= 4.5.2
Version: >= 5.0.0, <= 5.0.12
Version: >= 5.1.0, <= 5.1.6
Version: >= 5.2.0, <= 5.2.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-31207",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-04T17:23:36.781933Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:36:11.128Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T01:46:04.483Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258",
               },
               {
                  name: "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">= 2.7.0, <= 2.9.17",
                  },
                  {
                     status: "affected",
                     version: ">= 3.0.0, <= 3.2.8",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0, <= 4.5.2",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, <= 5.0.12",
                  },
                  {
                     status: "affected",
                     version: ">= 5.1.0, <= 5.1.6",
                  },
                  {
                     status: "affected",
                     version: ">= 5.2.0, <= 5.2.5",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite (French word for \"quick\", pronounced /vit/, like \"veet\") is a frontend build tooling to improve the frontend development experience.`server.fs.deny` does not deny requests for patterns with directories. This vulnerability has been patched in version(s) 5.2.6, 5.1.7, 5.0.13, 4.5.3, 3.2.10 and 2.9.18.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284: Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-04T15:51:54.683Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g",
            },
            {
               name: "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0",
            },
            {
               name: "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48",
            },
            {
               name: "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67",
            },
            {
               name: "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9",
            },
            {
               name: "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258",
            },
            {
               name: "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649",
            },
         ],
         source: {
            advisory: "GHSA-8jhw-289h-jh2g",
            discovery: "UNKNOWN",
         },
         title: "Vite's `server.fs.deny` did not deny requests for patterns with directories",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-31207",
      datePublished: "2024-04-04T15:51:54.683Z",
      dateReserved: "2024-03-29T14:16:31.900Z",
      dateUpdated: "2024-08-02T01:46:04.483Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-45812
Vulnerability from cvelistv5
Published
2024-09-17 20:08
Modified
2024-09-18 13:59
Summary
Vite a frontend build tooling framework for javascript. Affected versions of vite were discovered to contain a DOM Clobbering vulnerability when building scripts to `cjs`/`iife`/`umd` output format. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. We have identified a DOM Clobbering vulnerability in Vite bundled scripts, particularly when the scripts dynamically import other scripts from the assets folder and the developer sets the build output format to `cjs`, `iife`, or `umd`. In such cases, Vite replaces relative paths starting with `__VITE_ASSET__` using the URL retrieved from `document.currentScript`. However, this implementation is vulnerable to a DOM Clobbering attack. The `document.currentScript` lookup can be shadowed by an attacker via the browser's named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server. This vulnerability can result in cross-site scripting (XSS) attacks on websites that include Vite-bundled files (configured with an output format of `cjs`, `iife`, or `umd`) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
vitejs vite Version: >= 5.4.0, < 5.4.6
Version: >= 5.3.0, < 5.3.6
Version: >= 5.0.0, < 5.2.14
Version: >= 4.0.0, < 4.5.5
Version: < 3.2.11
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "vite",
                  vendor: "vitejs",
                  versions: [
                     {
                        lessThan: "5.4.6",
                        status: "affected",
                        version: "5.4.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.3.6",
                        status: "affected",
                        version: "5.3.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "5.2.14",
                        status: "affected",
                        version: "5.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.5.5",
                        status: "affected",
                        version: "4.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "3.2.11",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-45812",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-18T13:57:07.046459Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-18T13:59:14.314Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "vite",
               vendor: "vitejs",
               versions: [
                  {
                     status: "affected",
                     version: ">= 5.4.0, < 5.4.6",
                  },
                  {
                     status: "affected",
                     version: ">= 5.3.0, < 5.3.6",
                  },
                  {
                     status: "affected",
                     version: ">= 5.0.0, < 5.2.14",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0, < 4.5.5",
                  },
                  {
                     status: "affected",
                     version: "< 3.2.11",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Vite a frontend build tooling framework for javascript. Affected versions of vite were discovered to contain a DOM Clobbering vulnerability when building scripts to `cjs`/`iife`/`umd` output format. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. We have identified a DOM Clobbering vulnerability in Vite bundled scripts, particularly when the scripts dynamically import other scripts from the assets folder and the developer sets the build output format to `cjs`, `iife`, or `umd`. In such cases, Vite replaces relative paths starting with `__VITE_ASSET__` using the URL retrieved from `document.currentScript`. However, this implementation is vulnerable to a DOM Clobbering attack. The `document.currentScript` lookup can be shadowed by an attacker via the browser's named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server. This vulnerability can result in cross-site scripting (XSS) attacks on websites that include Vite-bundled files (configured with an output format of `cjs`, `iife`, or `umd`) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-17T20:08:13.372Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/vitejs/vite/security/advisories/GHSA-64vr-g452-qvp3",
            },
            {
               name: "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986",
            },
            {
               name: "https://github.com/vitejs/vite/commit/ade1d89660e17eedfd35652165b0c26905259fad",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/vitejs/vite/commit/ade1d89660e17eedfd35652165b0c26905259fad",
            },
            {
               name: "https://research.securitum.com/xss-in-amp4email-dom-clobbering",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://research.securitum.com/xss-in-amp4email-dom-clobbering",
            },
            {
               name: "https://scnps.co/papers/sp23_domclob.pdf",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://scnps.co/papers/sp23_domclob.pdf",
            },
         ],
         source: {
            advisory: "GHSA-64vr-g452-qvp3",
            discovery: "UNKNOWN",
         },
         title: "DOM Clobbering gadget found in vite bundled scripts that leads to XSS in Vite",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-45812",
      datePublished: "2024-09-17T20:08:13.372Z",
      dateReserved: "2024-09-09T14:23:07.505Z",
      dateUpdated: "2024-09-18T13:59:14.314Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}