logo

CVE-2023-7078 miniflare

Package

Manager: npm
Name: miniflare
Vulnerable Version: >=3.20230821.0 <3.20231030.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

EPSS: 0.00046 pctl0.1374

Details

Miniflare vulnerable to Server-Side Request Forgery (SSRF) ### Impact Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in `wrangler` until `3.19.0`), an attacker on the local network could access other local servers. ### Patches The issue was fixed in `miniflare@3.20231030.2`. ### Workarounds Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the `host: "127.0.0.1"` option. ### References - https://github.com/cloudflare/workers-sdk/pull/4532

Metadata

Created: 2023-12-29T19:36:41Z
Modified: 2023-12-29T19:36:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-fwvg-2739-22v7/GHSA-fwvg-2739-22v7.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-fwvg-2739-22v7
Finding: F100
Auto approve: 1