π¨ [security] [js] Update vite 2.9.13 β 7.1.5 (major) #1187
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
π¨ Your current dependencies have known security vulnerabilities π¨
This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!
Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.
What changed?
β³οΈ vite (2.9.13 β 7.1.5) Β· Repo Β· Changelog
Security Advisories π¨
π¨ Vite's `server.fs` settings were not applied to HTML files
π¨ Vite middleware may serve files starting with the same name with the public directory
π¨ Vite middleware may serve files starting with the same name with the public directory
π¨ Vite middleware may serve files starting with the same name with the public directory
π¨ Vite middleware may serve files starting with the same name with the public directory
π¨ Vite's `server.fs` settings were not applied to HTML files
π¨ Vite's `server.fs` settings were not applied to HTML files
π¨ Vite's `server.fs` settings were not applied to HTML files
π¨ Vite's server.fs.deny bypassed with /. for files under project root
π¨ Vite's server.fs.deny bypassed with /. for files under project root
π¨ Vite's server.fs.deny bypassed with /. for files under project root
π¨ Vite's server.fs.deny bypassed with /. for files under project root
π¨ Vite's server.fs.deny bypassed with /. for files under project root
π¨ Vite has an `server.fs.deny` bypass with an invalid `request-target`
π¨ Vite has an `server.fs.deny` bypass with an invalid `request-target`
π¨ Vite has an `server.fs.deny` bypass with an invalid `request-target`
π¨ Vite has an `server.fs.deny` bypass with an invalid `request-target`
π¨ Vite has an `server.fs.deny` bypass with an invalid `request-target`
π¨ Vite allows server.fs.deny to be bypassed with .svg or relative paths
π¨ Vite allows server.fs.deny to be bypassed with .svg or relative paths
π¨ Vite allows server.fs.deny to be bypassed with .svg or relative paths
π¨ Vite allows server.fs.deny to be bypassed with .svg or relative paths
π¨ Vite allows server.fs.deny to be bypassed with .svg or relative paths
π¨ Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
π¨ Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
π¨ Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
π¨ Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
π¨ Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query
π¨ Vite bypasses server.fs.deny when using ?raw??
π¨ Vite bypasses server.fs.deny when using ?raw??
π¨ Vite bypasses server.fs.deny when using ?raw??
π¨ Vite bypasses server.fs.deny when using ?raw??
π¨ Vite bypasses server.fs.deny when using ?raw??
π¨ Websites were able to send any requests to the development server and read the response in vite
π¨ Websites were able to send any requests to the development server and read the response in vite
π¨ Websites were able to send any requests to the development server and read the response in vite
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite DOM Clobbering gadget found in vite bundled scripts that leads to XSS
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite's `server.fs.deny` is bypassed when using `?import&raw`
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite's `server.fs.deny` did not deny requests for patterns with directories.
π¨ Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
π¨ Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
π¨ Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
π¨ Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem
π¨ Vite XSS vulnerability in `server.transformIndexHtml` via URL payload
π¨ Vite XSS vulnerability in `server.transformIndexHtml` via URL payload
π¨ Vite XSS vulnerability in `server.transformIndexHtml` via URL payload
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
π¨ Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service
Release Notes
Too many releases to show here. View the full release notes.
Commits
See the full diff on Github. The new version differs by more commits than we can show here.
Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with
@depfu rebase.All Depfu comment commands