支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 8942678ba9fb8c4bfd351cce5bf2572dff7742a4

来源
关联漏洞
标题:Vite 访问控制错误漏洞 (CVE-2026-39364)
Description:Vite是Vite开源的一种新型的前端构建工具。 Vite 7.1.0至7.3.2之前版本和8.0.5之前版本存在访问控制错误漏洞,该漏洞源于服务器文件拒绝列表可被绕过,可能导致检索应被阻止的文件。
Description
Vite is a modern frontend build tool. In Vite prior to versions 6.4.3, 6.3.4, and 5.4.23, a directory traversal vulnerability affects the Vite development server. When the Vite dev server is launched with the --host or server.host option, an unauthenticated attacker can craft a request with a path containing dot segments (e.g., /.vite/../<filename>) to bypass static file restrictions and access arbitrary files on the filesystem under the project root. The vulnerability allows access to files normally denied by Vite’s "server.fs.deny" setting, including sensitive files like .env, configuration files, or credentials in the project root. This issue has been fixed in versions 6.4.3, 6.3.4, and 5.4.23.
文件快照

id: CVE-2026-39364 info: name: Vite Dev Server - Directory Traversal author: ritikchaddha sev ...
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。