Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-56159

Опубликовано: 19 дек. 2024
Источник: nvd
CVSS3: 5.3
EPSS Низкий

Описание

Astro is a web framework for content-driven websites. A bug in the build process allows any unauthenticated user to read parts of the server source code. During build, along with client assets such as css and font files, the sourcemap files for the server code are moved to a publicly-accessible folder. Any outside party can read them with an unauthorized HTTP GET request to the same server hosting the rest of the website. While some server files are hashed, making their access obscure, the files corresponding to the file system router (those in src/pages) are predictably named. For example. the sourcemap file for src/pages/index.astro gets named dist/client/pages/index.astro.mjs.map. This vulnerability is the root cause of issue #12703, which links to a simple stackblitz project demonstrating the vulnerability. Upon build, notice the contents of the dist/client (referred to as config.build.client in astro code) folder. All astro servers make the folder in question accessi

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:*
Версия до 4.16.18 (исключая)
cpe:2.3:a:astro:astro:*:*:*:*:*:node.js:*:*
Версия от 5.0.0 (включая) до 5.0.8 (исключая)

EPSS

Процентиль: 78%
0.01127
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-219

Связанные уязвимости

github
около 1 года назад

Astro's server source code is exposed to the public if sourcemaps are enabled

EPSS

Процентиль: 78%
0.01127
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-219