You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Strapi/pack‑up version 5.1.0 currently uses esbuild v0.20.2 (and its Vite dependency uses esbuild v0.21.5), both of which are vulnerable due to a default CORS misconfiguration. This vulnerability (GHSA-67mh-4wv8-2f99, CVSS 5.3, CWE-346) allows an attacker to bypass same-origin restrictions when using the esbuild development server. Updating to esbuild ≥0.25.0 (as used in Vite milestone ≥6.2.0) would mitigate this risk.
What's Wrong?
Current Versions:
Strapi/pack‑up 5.1.0 uses esbuild v0.20.2.
Vite v5.4.8 (used by Strapi) in turn uses esbuild v0.21.5.
Patched Version:
Vite milestone ≥6.2.0 now uses a patched esbuild version (≥0.25.0).
The esbuild development server in versions prior to 0.25.0 sets Access-Control-Allow-Origin: * for all responses—including for Server-Sent Events (SSE) endpoints and bundled asset requests. This overly permissive CORS configuration can allow a remote attacker to fetch internal JavaScript bundles and source maps from the development server.
Impact
Vulnerability Type:
Unsafe default CORS settings in esbuild’s development server.
Potential Impact:
In a misconfigured deployment or during development, sensitive JavaScript bundles and source maps can be accessed from a remote origin, potentially exposing internal application logic or confidential information.
Scope:
This vulnerability primarily affects environments that rely on the esbuild development server. While production deployments should not run the development server, accidental exposure or misconfiguration can lead to information leakage.
Recommendation:
Update the esbuild dependency (and transitively Vite’s dependency, if applicable) to a version ≥0.25.0 where this issue has been patched. This would bring Strapi/pack‑up inline with Vite milestone ≥6.2.0 and reduce the risk of unauthorized asset access.
To Reproduce
Setup:
Use a Strapi project running pack‑up 5.1.0 (which installs esbuild v0.20.2) in development mode.
Reproduction Steps:
Start the development server normally.
From a browser on a different origin (or using a tool like curl or a browser console), execute:
Due to the default CORS header (Access-Control-Allow-Origin: *), the request will succeed and return the bundled JavaScript content (or source maps if enabled).
Observation:
This demonstrates that an attacker (or any unauthenticated user) could retrieve potentially sensitive bundled assets simply by knowing or guessing the URL.
Expected Behaviour
A security tool such as OWASP shouldn't identify any vulnerabilities when @strapi/pack-up is being utilized
The text was updated successfully, but these errors were encountered:
Strapi/pack‑up version 5.1.0 currently uses esbuild v0.20.2 (and its Vite dependency uses esbuild v0.21.5), both of which are vulnerable due to a default CORS misconfiguration. This vulnerability (GHSA-67mh-4wv8-2f99, CVSS 5.3, CWE-346) allows an attacker to bypass same-origin restrictions when using the esbuild development server. Updating to esbuild ≥0.25.0 (as used in Vite milestone ≥6.2.0) would mitigate this risk.
What's Wrong?
Current Versions:
Patched Version:
Vulnerability Information:
Technical Issue:
Impact
Vulnerability Type:
Potential Impact:
Scope:
Recommendation:
To Reproduce
Setup:
Use a Strapi project running pack‑up 5.1.0 (which installs esbuild v0.20.2) in development mode.
Reproduction Steps:
Observation:
Expected Behaviour
A security tool such as OWASP shouldn't identify any vulnerabilities when @strapi/pack-up is being utilized
The text was updated successfully, but these errors were encountered: