Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-45811

Опубликовано: 17 сент. 2024
Источник: redhat
CVSS3: 4.8

Описание

Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. @fs denies access to files outside of Vite serving allow list. Adding ?import&raw to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.

A flaw was found in ViteJS. @fs denies access to files outside of Vite serving allow list. Adding ?import&raw to the URL bypasses this limitation and returns the file content if it exists, which can allow an attacker to access arbitrary files via the browser.

Отчет

This vulnerability is classified as moderate rather than high severity because it requires specific conditions for exploitation. The attacker must have access to the Vite server, which typically runs in a local development environment rather than in production. Additionally, the bypass allows file access only if the file path is already known or predictable, limiting the attacker's ability to arbitrarily explore the file system. While it exposes file content outside the Vite serving allow list, the scope of access is constrained, and the impact can be mitigated by proper server configurations and deployment practices.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2automation-controllerAffected
Red Hat Ansible Automation Platform 2automation-eda-controllerNot affected
Red Hat JBoss Enterprise Application Platform 8viteNot affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-agent-rhel8Not affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-collector-rhel8Not affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-es-index-cleaner-rhel8Not affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-es-rollover-rhel8Not affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-ingester-rhel8Not affected
Red Hat OpenShift distributed tracing 3rhosdt/jaeger-query-rhel8Affected
Red Hat OpenShift distributed tracing 3.4registry.redhat.io/rhosdt/jaeger-query-rhel8FixedRHSA-2024:1091710.12.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2312930vite: server.fs.deny is bypassed when using `?import&raw`

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
nvd
больше 1 года назад

Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import&raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 4.8
debian
больше 1 года назад

Vite a frontend build tooling framework for javascript. In affected ve ...

CVSS3: 5.3
github
больше 1 года назад

Vite's `server.fs.deny` is bypassed when using `?import&raw`

4.8 Medium

CVSS3