CVE-2025-30208: Vite – Arbitrary File Read

CVE-2025-30208: Vite - Arbitrary File Read-渗透云记 - 专注于网络安全与技术分享
CVE-2025-30208: Vite – Arbitrary File Read
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2025-30208: Vite – Arbitrary File Read

漏洞描述

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `–host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享