CVE-2024-34343 – Cross-site Scripting (XSS) in navigateTo if used after SSR in nuxt
https://notcve.org/view.php?id=CVE-2024-34343
Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. The `navigateTo` function attempts to blockthe `javascript:` protocol, but does not correctly use API's provided by `unjs/ufo`. This library also contains parsing discrepancies. The function first tests to see if the specified URL has a protocol. This uses the unjs/ufo package for URL parsing. • https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-23657 – Path Traversal: '../filedir' in Nuxt Devtools
https://notcve.org/view.php?id=CVE-2024-23657
Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. Nuxt Devtools is missing authentication on the `getTextAssetContent` RPC function which is vulnerable to path traversal. Combined with a lack of Origin checks on the WebSocket handler, an attacker is able to interact with a locally running devtools instance and exfiltrate data abusing this vulnerability. In certain configurations an attacker could leak the devtools authentication token and then abuse other RPC functions to achieve RCE. The `getTextAssetContent` function does not check for path traversals, this could allow an attacker to read arbitrary files over the RPC WebSocket. • https://github.com/nuxt/devtools/blob/c4f2b68281203fc3f61ffc97d9c6623fbfde46bb/packages/devtools/src/dev-auth.ts#L14 https://github.com/nuxt/devtools/blob/c4f2b68281203fc3f61ffc97d9c6623fbfde46bb/packages/devtools/src/server-rpc/assets.ts#L88C48-L88C48 https://github.com/nuxt/devtools/blob/c4f2b68281203fc3f61ffc97d9c6623fbfde46bb/packages/devtools/src/server-rpc/assets.ts#L96C11-L96C28 https://github.com/nuxt/devtools/blob/c4f2b68281203fc3f61ffc97d9c6623fbfde46bb/packages/devtools/src/server-rpc/index.ts#L109 https://github.com/nuxt/nuxt/secu • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-24: Path Traversal: '../filedir' •
CVE-2023-3224 – Code Injection in nuxt/nuxt
https://notcve.org/view.php?id=CVE-2023-3224
Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3. Inyección de código en el repositorio de GitHub nuxt/nuxt anterior a 3.5.3. • https://github.com/nuxt/nuxt/commit/65a8f4eb3ef1b249a95fd59e323835a96428baff https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-2138 – Use of Hard-coded Credentials in nuxtlabs/github-module
https://notcve.org/view.php?id=CVE-2023-2138
Use of Hard-coded Credentials in GitHub repository nuxtlabs/github-module prior to 1.6.2. • https://github.com/nuxtlabs/github-module/commit/5490c43f729eee60f07920bf88c0aabdc1398b6e https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6 • CWE-798: Use of Hard-coded Credentials •
CVE-2023-0878 – Cross-site Scripting (XSS) - Generic in nuxt/framework
https://notcve.org/view.php?id=CVE-2023-0878
Cross-site Scripting (XSS) - Generic in GitHub repository nuxt/framework prior to 3.2.1. • https://github.com/nuxt/framework/commit/7aa35ff958eec0c7d071d3fcd481db57281dbcd9 https://huntr.dev/bounties/a892caf7-b8c2-4638-8cee-eb779d51066a • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •