|
|||
Rule General Information |
---|
Release Date: | 2025-02-18 | |
Rule Name: | Vitest Browser Mode Arbitrary File Read Vulnerability (CVE-2025-24963) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to get the content of arbitrary files.This `__screenshot-error` handler on the browser mode HTTP server responds any file on the file system. This code was added by commit `2d62051`. Users explicitly exposing the browser mode server to the network by `browser.api.host: true` may get any files exposed. This issue has been addressed in versions 2.1.9 and 3.0.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/vitest-dev/vitest/blob/f17918a79969d27a415f70431e08a9445b051e45/packages/browser/src/node/plugin.ts#L88-L130 https://github.com/vitest-dev/vitest/commit/2d62051f13b4b0939b2f7e94e88006d830dc4d1f https://github.com/vitest-dev/vitest/security/advisories/GHSA-8gvc-j273-4wm5 https://vitest.dev/guide/browser/config.html#browser-api |
|
Solutions |
---|
Refer to the announcement or patch by the vendor:https://github.com/vitest-dev/vitest/security/advisories/GHSA-8gvc-j273-4wm5 |