[Security] Bump vite from 6.2.3 to 6.2.4 in /webapp
Bumps vite from 6.2.3 to 6.2.4. This update includes a security fix.
Vulnerabilities fixed
Vite has a
server.fs.denybypassed forinlineandrawwith?importquerySummary
The contents of arbitrary files can be returned to the browser.
Impact
Only apps explicitly exposing the Vite dev server to the network (using
--hostorserver.hostconfig option) are affected.Details
- base64 encoded content of non-allowed files is exposed using
?inline&import(originally reported as?import&?inline=1.wasm?init)- content of non-allowed files is exposed using
?raw?import
/@fs/isn't needed to reproduce the issue for files inside the project root.PoC
Original report (check details above for simplified cases):
The ?import&?inline=1.wasm?init ending allows attackers to read arbitrary files and returns the file content if it exists. Base64 decoding needs to be performed twice
</tr></table>
... (truncated)
Patched versions: 4.5.11; 5.4.16; 6.0.13; 6.1.3; 6.2.4 Affected versions: = 6.2.0, < 6.2.4
Commits
-
037f801release: v6.2.4 -
7a4fabafix: fs check in transform middleware (#19761) - See full diff in compare view
Dependabot commands
You can trigger Dependabot actions by commenting on this MR
-
$dependabot recreatewill recreate this MR rewriting all the manual changes and resolving conflicts