|
|||
Rule General Information |
---|
Release Date: | 2025-03-27 | |
Rule Name: | Vite 6.2.2 Arbitrary File Read Vulnerability (CVE-2025-30208) | |
Severity: | Critical | |
CVE ID: | CVE-2025-30208 | |
Rule Protection Details |
---|
Description: | Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses and returns the file content if it exists. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue. | |
Impact: | An attacker may read arbitrary file on system like id_rsa, /etc/passwd, config files, etc. Which will cause sensitive information disclosure, account takeover, code execution, etc. | |
Affected OS: | Windows, Linux, Others | |
Reference: | ||
Solutions |
---|
Upgrade to Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 to fix the issue. Do not expose Vite Dev Server on public network. |