Improper Handling of Case Sensitivity Affecting vite package, versions <5.0.12-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-VITE-6228091
  • published5 Feb 2024
  • disclosed19 Jan 2024

Introduced: 19 Jan 2024

CVE-2024-23331  (opens in a new tab)
CWE-178  (opens in a new tab)
CWE-200  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Chainguard vite to version 5.0.12-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream vite package and not the vite package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Vite is a frontend tooling framework for javascript. The Vite dev server option server.fs.deny can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since picomatch defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from config.server.fs.deny fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.

CVSS Scores

version 3.1