Update dependency vitest to v1.6.1 [SECURITY]#2
Conversation
Reviewer's Guide by SourceryThis pull request implements a dependency update by modifying the pnpm-lock.yaml file. The main focus is on updating the vitest dependency from v1.6.0 to v1.6.1 to address a critical security vulnerability (CSWSH) and ensure that all associated packages and transitive dependencies are consistent with the new version. In addition, several other package versions have been bumped for consistency and to include minor bug fixes and improvements. No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
|
5a17685 to
1edadb4
Compare
1edadb4 to
5728eaf
Compare
fc8aeae to
1bfbfaa
Compare
1915610 to
bf73faa
Compare
bf73faa to
a255e94
Compare
a255e94 to
7e9ecf6
Compare
88dc413 to
90f4df0
Compare
90f4df0 to
f03c1a3
Compare
e58d02d to
9f41009
Compare
9f41009 to
f848081
Compare
f848081 to
27892b7
Compare
27892b7 to
d1a55ce
Compare
d1a55ce to
15c81ce
Compare
50bd44d to
680720a
Compare
680720a to
4a5f770
Compare
4a5f770 to
0e326a4
Compare
0e326a4 to
9bda50e
Compare
b4d529b to
187fd54
Compare
187fd54 to
00b30e4
Compare
00b30e4 to
a5b5b42
Compare
9fc77c0 to
8e18557
Compare
8e18557 to
2506947
Compare
2506947 to
c39717c
Compare
c39717c to
2eb21ff
Compare
This PR contains the following updates:
1.6.0→1.6.1Vitest allows Remote Code Execution when accessing a malicious website while Vitest API server is listening
CVE-2025-24964 / GHSA-9crc-q9x8-hgqq
More information
Details
Summary
Arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks.
Details
When
apioption is enabled (Vitest UI enables it), Vitest starts a WebSocket server. This WebSocket server did not check Origin header and did not have any authorization mechanism and was vulnerable to CSWSH attacks.https://github.com/vitest-dev/vitest/blob/9a581e1c43e5c02b11e2a8026a55ce6a8cb35114/packages/vitest/src/api/setup.ts#L32-L46
This WebSocket server has
saveTestFileAPI that can edit a test file andrerunAPI that can rerun the tests. An attacker can execute arbitrary code by injecting a code in a test file by thesaveTestFileAPI and then running that file by calling thererunAPI.https://github.com/vitest-dev/vitest/blob/9a581e1c43e5c02b11e2a8026a55ce6a8cb35114/packages/vitest/src/api/setup.ts#L66-L76
PoC
calcexecutable inPATHenv var (you'll likely have it if you are running on Windows), that application will be executed.Impact
This vulnerability can result in remote code execution for users that are using Vitest serve API.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
vitest-dev/vitest (vitest)
v1.6.1Compare Source
This release includes security patches for:
🐞 Bug Fixes
View changes on GitHub
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.