Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
CVE-2023-34092
Summary
The Vite frontend tooling framework contains a vulnerability that allows unauthenticated users to bypass server file restrictions using a double forward-slash (//). This weakness enables access to sensitive files from the Vite project’s root directory, potentially exposing default configurations that should remain protected, such as '.env' files and SSL certificates. The issue primarily affects users who have explicitly configured the Vite development server to be accessible over a network. It is essential for developers using affected versions to upgrade to the patched versions to secure their configurations from improper exposure.
Affected Version(s)
vite < 2.9.16 < 2.9.16
vite >= 3.0.2, < 3.2.7 < 3.0.2, 3.2.7
vite >= 4.0.0, < 4.0.5 < 4.0.0, 4.0.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved