org.webjars.npm:vite@3.1.0-beta.2 vulnerabilities

  • latest version

    5.4.9

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    a month ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:vite package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

org.webjars.npm:vite is a Native-ESM powered web dev build tool

Affected versions of this package are vulnerable to Information Exposure when using ?import&raw in the URL parameters. An attacker can access file contents that should be restricted by exploiting this bypass mechanism.

How to fix Information Exposure?

Upgrade org.webjars.npm:vite to version 5.4.9 or higher.

[,5.4.9)
  • L
Cross-site Scripting (XSS)

org.webjars.npm:vite is a Native-ESM powered web dev build tool

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the document.currentScript lookup mechanism when building scripts to cjs/iife/umd output format. This vulnerability is exploitable on websites that allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes.

How to fix Cross-site Scripting (XSS)?

Upgrade org.webjars.npm:vite to version 5.4.9 or higher.

[,5.4.9)
  • M
Improper Access Control

org.webjars.npm:vite is a Native-ESM powered web dev build tool

Affected versions of this package are vulnerable to Improper Access Control due to improper request handling through server.fs.deny configuration, which fails to deny requests for patterns with directories. This misconfiguration allows an attacker to bypass intended access restrictions and retrieve sensitive files from the server by crafting specific requests.

Note:

Only apps setting a custom server.fs.deny that includes a pattern with directories and explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.

How to fix Improper Access Control?

Upgrade org.webjars.npm:vite to version 5.4.9 or higher.

[,5.4.9)
  • H
Access Control Bypass

org.webjars.npm:vite is a Native-ESM powered web dev build tool

Affected versions of this package are vulnerable to Access Control Bypass via the server.fs.deny option. An attacker can gain access to sensitive files by requesting raw filesystem paths using case-augmented versions of filenames. This is only exploitable if the server is hosted on a case-insensitive filesystem, including those used by Windows.

How to fix Access Control Bypass?

Upgrade org.webjars.npm:vite to version 5.4.9 or higher.

[,5.4.9)
  • H
Path Equivalence

org.webjars.npm:vite is a Native-ESM powered web dev build tool

Affected versions of this package are vulnerable to Path Equivalence such that Server Options (server.fs.deny) can be bypassed using double forward-slash (//) allowing any unauthenticated user to read files from the Vite root-path of the application including the default fs.deny settings (['.env', '.env.*', '*.{crt,pem}']).

Note:

Only users explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected, and only files in the immediate Vite project root folder could be exposed.

How to fix Path Equivalence?

Upgrade org.webjars.npm:vite to version 5.4.9 or higher.

[,5.4.9)