6.1

CVE-2023-49293

Exploit
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in vite@5.0.5, vite@4.5.1, and vite@4.4.12. There are no known workarounds for this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VitejsVite SwPlatformnode.js Version >= 4.4.0 <= 4.4.11
VitejsVite SwPlatformnode.js Version >= 5.0.0 <= 5.0.4
VitejsVite Version5.0.0 Update- SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta0 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta1 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta10 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta11 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta12 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta13 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta14 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta15 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta16 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta17 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta18 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta19 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta2 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta20 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta3 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta4 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta5 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta6 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta7 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta8 SwPlatformnode.js
VitejsVite Version5.0.0 Updatebeta9 SwPlatformnode.js
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.34% 0.561
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
security-advisories@github.com 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.