Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-34092
HistoryJun 01, 2023 - 4:29 p.m.

CVE-2023-34092 Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)

2023-06-0116:29:51
CWE-50
CWE-200
GitHub_M
raw.githubusercontent.com
1
vite server options
bypass vulnerability
patched versions
security risk
unauthenticated access

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%

Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default fs.deny settings (['.env', '.env.*', '*.{crt,pem}']). Only users explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in [email protected], [email protected], [email protected], [email protected], [email protected], and [email protected].

6.1 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%