Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vitest-1.0.4.tgz: 1 vulnerabilities (highest severity is: 9.6) #79

Open
mend-bolt-for-github bot opened this issue Feb 5, 2025 · 0 comments
Open
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-bolt-for-github
Copy link

Vulnerable Library - vitest-1.0.4.tgz

Library home page: https://registry.npmjs.org/vitest/-/vitest-1.0.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (vitest version) Remediation Possible**
CVE-2025-24964 Critical 9.6 vitest-1.0.4.tgz Direct vitest - 1.6.1,2.1.9,3.0.5

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-24964

Vulnerable Library - vitest-1.0.4.tgz

Library home page: https://registry.npmjs.org/vitest/-/vitest-1.0.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Dependency Hierarchy:

  • vitest-1.0.4.tgz (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks. When "api" option is enabled (Vitest UI enables it), Vitest starts a WebSocket server. This WebSocket server did not check Origin header and did not have any authorization mechanism and was vulnerable to CSWSH attacks. This WebSocket server has "saveTestFile" API that can edit a test file and "rerun" API that can rerun the tests. An attacker can execute arbitrary code by injecting a code in a test file by the "saveTestFile" API and then running that file by calling the "rerun" API. This vulnerability can result in remote code execution for users that are using Vitest serve API. This issue has been patched in versions 1.6.1, 2.1.9 and 3.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Publish Date: 2025-02-04

URL: CVE-2025-24964

CVSS 3 Score Details (9.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-9crc-q9x8-hgqq

Release Date: 2025-02-04

Fix Resolution: vitest - 1.6.1,2.1.9,3.0.5

Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Feb 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants