Skip to content

chore(deps): update dependency vite to v6.1.2 [security] (main)#5447

Merged
renovate[bot] merged 1 commit intomainfrom
renovate/main-npm-vite-vulnerability
Mar 26, 2025
Merged

chore(deps): update dependency vite to v6.1.2 [security] (main)#5447
renovate[bot] merged 1 commit intomainfrom
renovate/main-npm-vite-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 26, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
vite (source) 6.1.0 -> 6.1.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-30208

Summary

The contents of arbitrary files can be returned to the browser.

Impact

Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.

Details

@fs denies access to files outside of Vite serving allow list. Adding ?raw?? or ?import&raw?? to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as ? are removed in several places, but are not accounted for in query string regexes.

PoC

$ npm create vite@latest
$ cd vite-project/
$ npm install
$ npm run dev

$ echo "top secret content" > /tmp/secret.txt

# expected behaviour
$ curl "http://localhost:5173/@​fs/tmp/secret.txt"

    <body>
      <h1>403 Restricted</h1>
      <p>The request url &quot;/tmp/secret.txt&quot; is outside of Vite serving allow list.

# security bypassed
$ curl "http://localhost:5173/@&#8203;fs/tmp/secret.txt?import&raw??"
export default "top secret content\n"
//# sourceMappingURL=data:application/json;base64,eyJ2...

Vite bypasses server.fs.deny when using ?raw??

CVE-2025-30208 / GHSA-x574-m823-4x7w

More information

Details

Summary

The contents of arbitrary files can be returned to the browser.

Impact

Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected.

Details

@fs denies access to files outside of Vite serving allow list. Adding ?raw?? or ?import&raw?? to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as ? are removed in several places, but are not accounted for in query string regexes.

PoC
$ npm create vite@latest
$ cd vite-project/
$ npm install
$ npm run dev

$ echo "top secret content" > /tmp/secret.txt

##### expected behaviour
$ curl "http://localhost:5173/@&#8203;fs/tmp/secret.txt"

    <body>
      <h1>403 Restricted</h1>
      <p>The request url &quot;/tmp/secret.txt&quot; is outside of Vite serving allow list.

##### security bypassed
$ curl "http://localhost:5173/@&#8203;fs/tmp/secret.txt?import&raw??"
export default "top secret content\n"
//# sourceMappingURL=data:application/json;base64,eyJ2...

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

vitejs/vite (vite)

v6.1.2

Compare Source

Please refer to CHANGELOG.md for details.

v6.1.1

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the security label Mar 26, 2025
@renovate renovate bot requested review from a team as code owners March 26, 2025 06:39
@renovate renovate bot requested review from GenPage and removed request for a team March 26, 2025 06:39
@renovate renovate bot enabled auto-merge (squash) March 26, 2025 06:39
@renovate renovate bot requested review from X-Guardian and nitrocode and removed request for a team March 26, 2025 06:39
@dosubot dosubot bot added the dependencies PRs that update a dependency file label Mar 26, 2025
@renovate renovate bot merged commit 7176b49 into main Mar 26, 2025
32 of 34 checks passed
@renovate renovate bot deleted the renovate/main-npm-vite-vulnerability branch March 26, 2025 06:42
CaioAugustoo pushed a commit to CaioAugustoo/atlantis that referenced this pull request Mar 27, 2025
…tlantis#5447)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
joe1981al pushed a commit to joe1981al/atlantis that referenced this pull request Jun 20, 2025
…tlantis#5447)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Signed-off-by: Joseph McDonald <jojosr2000@gmail.com>
dimisjim pushed a commit to dimisjim/atlantis that referenced this pull request Oct 29, 2025
…tlantis#5447)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Signed-off-by: dimisjim <dimitris.moraitidis@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies PRs that update a dependency file security website

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants