CVE-2023-7078 – miniflare
Package
Manager: npm
Name: miniflare
Vulnerable Version: >=3.20230821.0 <3.20231030.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00046 pctl0.1374
Details
Miniflare vulnerable to Server-Side Request Forgery (SSRF) ### Impact Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in `wrangler` until `3.19.0`), an attacker on the local network could access other local servers. ### Patches The issue was fixed in `miniflare@3.20231030.2`. ### Workarounds Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the `host: "127.0.0.1"` option. ### References - https://github.com/cloudflare/workers-sdk/pull/4532
Metadata
Created: 2023-12-29T19:36:41Z
Modified: 2023-12-29T19:36:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-fwvg-2739-22v7/GHSA-fwvg-2739-22v7.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-fwvg-2739-22v7
Finding: F100
Auto approve: 1