cve/2024/CVE-2024-23331.md

21 lines
1.7 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-23331](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23331)
![](https://img.shields.io/static/v1?label=Product&message=vite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D2.7.0%2C%20%3C%202.9.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%3A%20Improper%20Access%20Control&color=brighgreen)
### Description
Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn't discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.
### POC
#### Reference
- https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw
#### Github
- https://github.com/seal-community/patches
- https://github.com/vignesh7701/CodeEditor-Beta