Access Control Bypass Affecting org.webjars.npm:vite package, versions [,5.4.9)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.07% (30th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGWEBJARSNPM-6182925
- published 21 Jan 2024
- disclosed 19 Jan 2024
- credit dariushoule
Introduced: 19 Jan 2024
CVE-2024-23331 Open this link in a new tabHow to fix?
Upgrade org.webjars.npm:vite
to version 5.4.9 or higher.
Overview
org.webjars.npm:vite is a Native-ESM powered web dev build tool
Affected versions of this package are vulnerable to Access Control Bypass via the server.fs.deny
option. An attacker can gain access to sensitive files by requesting raw filesystem paths using case-augmented versions of filenames. This is only exploitable if the server is hosted on a case-insensitive filesystem, including those used by Windows.
References
CVSS Scores
version 3.1