Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
CVE-2023-34092
What is CVE-2023-34092?
The Vite frontend tooling framework contains a vulnerability that allows unauthenticated users to bypass server file restrictions using a double forward-slash (//). This weakness enables access to sensitive files from the Vite project’s root directory, potentially exposing default configurations that should remain protected, such as '.env' files and SSL certificates. The issue primarily affects users who have explicitly configured the Vite development server to be accessible over a network. It is essential for developers using affected versions to upgrade to the patched versions to secure their configurations from improper exposure.
Affected Version(s)
vite < 2.9.16 < 2.9.16
vite >= 3.0.2, < 3.2.7 < 3.0.2, 3.2.7
vite >= 4.0.0, < 4.0.5 < 4.0.0, 4.0.5
References
EPSS Score
55% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
