[Security] Bump vite from 6.2.3 to 6.2.4 in /webapp
Bumps vite from 6.2.3 to 6.2.4. This update includes a security fix.
Vulnerabilities fixed
Vite has a
server.fs.deny
bypassed forinline
andraw
with?import
querySummary
The contents of arbitrary files can be returned to the browser.
Impact
Only apps explicitly exposing the Vite dev server to the network (using
--host
orserver.host
config option) are affected.Details
- base64 encoded content of non-allowed files is exposed using
?inline&import
(originally reported as?import&?inline=1.wasm?init
)- content of non-allowed files is exposed using
?raw?import
/@fs/
isn't needed to reproduce the issue for files inside the project root.PoC
Original report (check details above for simplified cases):
The ?import&?inline=1.wasm?init ending allows attackers to read arbitrary files and returns the file content if it exists. Base64 decoding needs to be performed twice
</tr></table>
... (truncated)
Patched versions: 4.5.11; 5.4.16; 6.0.13; 6.1.3; 6.2.4 Affected versions: = 6.2.0, < 6.2.4
Commits
-
037f801
release: v6.2.4 -
7a4faba
fix: fs check in transform middleware (#19761) - See full diff in compare view
Dependabot commands
You can trigger Dependabot actions by commenting on this MR
-
$dependabot recreate
will recreate this MR rewriting all the manual changes and resolving conflicts
Merge request reports
Activity
added dependencies javascript security labels
added severity:moderate label
mentioned in commit 0b77d534