mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
21 lines
1.7 KiB
Markdown
21 lines
1.7 KiB
Markdown
![]() |
### [CVE-2024-23331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23331)
|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/seal-community/patches
|
||
|
- https://github.com/vignesh7701/CodeEditor-Beta
|
||
|
|