CVE-2024-23331: Improper Access Control
Vite is a frontend tooling framework for javascript. The Vite dev server option server.fs.deny
can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 – with surface area reduced to hosts having case-insensitive filesystems. Since picomatch
defaults to case-sensitive glob matching, but the file server does not discriminate; a block list bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from config.server.fs.deny
fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.
References
- github.com/advisories/GHSA-c24v-8rfc-w8vw
- github.com/vitejs/vite/commit/0cd769c279724cf27934b1270fbdd45d68217691
- github.com/vitejs/vite/commit/91641c4da0a011d4c5352e88fc68389d4e1289a5
- github.com/vitejs/vite/commit/a26c87d20f9af306b5ce3ff1648be7fa5146c278
- github.com/vitejs/vite/commit/eeec23bbc9d476c54a3a6d36e78455867185a7cb
- github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw
- nvd.nist.gov/vuln/detail/CVE-2023-34092
- nvd.nist.gov/vuln/detail/CVE-2024-23331
- vitejs.dev/config/server-options.html
Detect and mitigate CVE-2024-23331 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →