Information Exposure Affecting vitess-18.0 package, versions <18.0.8-r12


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-VITESS180-9712301
  • published15 Apr 2025
  • disclosed10 Apr 2025

Introduced: 10 Apr 2025

NewCVE-2025-32395  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Chainguard vitess-18.0 to version 18.0.8-r12 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream vitess-18.0 package and not the vitess-18.0 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Vite is a frontend tooling framework for javascript. Prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, the contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2. On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won't contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) and running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun) are affected. This vulnerability is fixed in 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13.