CVE-2023-49293
04.12.2023, 23:15
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.
Vendor | Product | Version |
---|---|---|
vitejs | vite | 4.4.0 ≤ 𝑥 ≤ 4.4.11 |
vitejs | vite | 5.0.0 ≤ 𝑥 ≤ 5.0.4 |
vitejs | vite | 5.0.0 |
vitejs | vite | 5.0.0:beta0 |
vitejs | vite | 5.0.0:beta1 |
vitejs | vite | 5.0.0:beta10 |
vitejs | vite | 5.0.0:beta11 |
vitejs | vite | 5.0.0:beta12 |
vitejs | vite | 5.0.0:beta13 |
vitejs | vite | 5.0.0:beta14 |
vitejs | vite | 5.0.0:beta15 |
vitejs | vite | 5.0.0:beta16 |
vitejs | vite | 5.0.0:beta17 |
vitejs | vite | 5.0.0:beta18 |
vitejs | vite | 5.0.0:beta19 |
vitejs | vite | 5.0.0:beta2 |
vitejs | vite | 5.0.0:beta20 |
vitejs | vite | 5.0.0:beta3 |
vitejs | vite | 5.0.0:beta4 |
vitejs | vite | 5.0.0:beta5 |
vitejs | vite | 5.0.0:beta6 |
vitejs | vite | 5.0.0:beta7 |
vitejs | vite | 5.0.0:beta8 |
vitejs | vite | 5.0.0:beta9 |
𝑥
= Vulnerable software versions