Vite provides frontend tooling. Prior to versions 2.9.16, 3.2.7, 4.0.5, 4.1.5, 4.2.3, and 4.3.9, Vite Server Options (`server.fs.deny`) can be bypassed using double forward-slash (//) allows any unauthenticated user to read file from the Vite root-path of the application including the default `fs.deny` settings (`['.env', '.env.*', '*.{crt,pem}']`). Only users explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected, and only files in the immediate Vite project root folder could be exposed. This issue is fixed in vite@4.3.9, vite@4.2.3, vite@4.1.5, vite@4.0.5, vite@3.2.7, and vite@2.9.16.
Published 2023-06-01 17:15:11
Updated 2023-06-09 16:03:07
Source GitHub, Inc.
View at NVD,   CVE.org
Vulnerability category: Information leak

Products affected by CVE-2023-34092

  • Vitejs » Vite » For Node.js
    Versions from including (>=) 4.3.0 and before (<) 4.3.9
    cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
  • Vitejs » Vite » For Node.js
    Versions from including (>=) 4.1.0 and before (<) 4.1.5
    cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
  • Vitejs » Vite » For Node.js
    Versions from including (>=) 3.0.2 and before (<) 3.2.7
    cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
  • Vitejs » Vite » For Node.js
    Versions from including (>=) 4.0.0 and before (<) 4.0.5
    cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
  • Vitejs » Vite » For Node.js
    Versions from including (>=) 4.2.0 and before (<) 4.2.3
    cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*
  • Vitejs » Vite » Version: 2.9.15 For Node.js
    cpe:2.3:a:vitejs:vite:2.9.15:*:*:*:*:node.js:*:*

Exploit prediction scoring system (EPSS) score for CVE-2023-34092

0.16%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-34092

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9
3.6
NIST
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9
3.6
GitHub, Inc.

CWE ids for CVE-2023-34092

  • The product accepts path input in the form of multiple leading slash ('//multiple/leading/slash') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
    Assigned by: security-advisories@github.com (Secondary)
  • The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
    Assigned by: security-advisories@github.com (Secondary)
  • The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2023-34092

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!