Platform
nuxt
Component
nuxt
Fixed in
1.3.10
CVE-2024-23657 describes a Path Traversal vulnerability discovered in Nuxt Devtools, a debugging and development tool for Nuxt.js applications. This flaw allows attackers to potentially exfiltrate sensitive data and, in certain configurations, achieve Remote Code Execution (RCE). The vulnerability affects versions of Nuxt Devtools up to and including 1.3.9, with a fix available in version 1.3.9.
The core of the vulnerability lies in the getTextAssetContent RPC function within Nuxt Devtools. This function, responsible for retrieving asset content, lacks proper authentication and Origin checks. An attacker can exploit this by sending crafted requests to the WebSocket handler, bypassing security measures and accessing arbitrary files on the system where the devtools instance is running. Successful exploitation can lead to the leakage of sensitive configuration files, source code, or other critical data. The potential for RCE arises if an attacker can also obtain the devtools authentication token, enabling them to abuse other RPC functions with elevated privileges.
CVE-2024-23657 was publicly disclosed on August 5, 2024. Currently, there are no known active exploitation campaigns targeting this vulnerability. While a public proof-of-concept has not been widely publicized, the ease of exploitation makes it a potential target for opportunistic attackers. The vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
1.62% (82% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-23657 is to immediately upgrade Nuxt Devtools to version 1.3.9 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) or proxy to filter requests to the getTextAssetContent endpoint, blocking those without proper authentication. Restrict access to the devtools instance to trusted networks and users. Regularly review and audit the configuration of your Nuxt.js development environment to identify and address any potential security weaknesses. After upgrading, confirm the fix by attempting to access arbitrary files via the getTextAssetContent endpoint and verifying that access is denied.
Actualice Nuxt Devtools a la versión 1.3.9 o superior. Esta versión corrige la vulnerabilidad de path traversal y la falta de validación del origen en el WebSocket. La actualización evitará que atacantes remotos accedan a archivos arbitrarios y potencialmente ejecuten código en su sistema.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-23657 is a Path Traversal vulnerability affecting Nuxt Devtools versions up to 1.3.9. It allows attackers to potentially access sensitive files and, in some cases, achieve RCE.
You are affected if you are using Nuxt Devtools version 1.3.9 or earlier. Upgrade to version 1.3.9 or later to mitigate the vulnerability.
The recommended fix is to upgrade Nuxt Devtools to version 1.3.9 or later. As a temporary workaround, implement a WAF or proxy to filter requests to the vulnerable endpoint.
Currently, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation makes it a potential target.
Refer to the official Nuxt Devtools release notes and security advisories on the Nuxt website for the latest information.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.