Path Equivalence Affecting org.webjars.npm:vite package, versions [,5.4.9)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGWEBJARSNPM-5664719
- published 2 Jun 2023
- disclosed 2 Jun 2023
- credit agussetyar
Introduced: 2 Jun 2023
CVE-2023-34092 Open this link in a new tabHow to fix?
Upgrade org.webjars.npm:vite
to version 5.4.9 or higher.
Overview
org.webjars.npm:vite is a Native-ESM powered web dev build tool
Affected versions of this package are vulnerable to Path Equivalence such that Server Options (server.fs.deny
) can be bypassed using double forward-slash (//
) allowing any unauthenticated user to read files from the Vite root-path of the application including the default fs.deny
settings (['.env', '.env.*', '*.{crt,pem}']
).
Note:
Only users explicitly exposing the Vite dev server to the network (using --host
or server.host
config option) are affected, and only files in the immediate Vite project root folder could be exposed.