Path Equivalence Affecting vite package, versions <2.9.16 >=3.0.0 <3.2.7 >=4.0.0 <4.0.5 >=4.1.0 <4.1.5 >=4.2.0 <4.2.3 >=4.3.0 <4.3.9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-VITE-5664718
- published 2 Jun 2023
- disclosed 2 Jun 2023
- credit agussetyar
Introduced: 2 Jun 2023
CVE-2023-34092 Open this link in a new tabHow to fix?
Upgrade vite
to version 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, 4.3.9 or higher.
Overview
vite is a Native-ESM powered web dev build tool
Affected versions of this package are vulnerable to Path Equivalence such that Server Options (server.fs.deny
) can be bypassed using double forward-slash (//
) allowing any unauthenticated user to read files from the Vite root-path of the application including the default fs.deny
settings (['.env', '.env.*', '*.{crt,pem}']
).
Note:
Only users explicitly exposing the Vite dev server to the network (using --host
or server.host
config option) are affected, and only files in the immediate Vite project root folder could be exposed.