CVE-2023-7079 – wrangler
Package
Manager: npm
Name: wrangler
Vulnerable Version: >=3.9.0 <3.19.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00062 pctl0.19574
Details
Arbitrary remote file read in Wrangler dev server ### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wrangler to listen on local interfaces instead with `wrangler dev --ip 127.0.0.1`. This is the [default as of `wrangler@3.16.0`](https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf), and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website. ### References - https://github.com/cloudflare/workers-sdk/pull/4532 - https://github.com/cloudflare/workers-sdk/pull/4535
Metadata
Created: 2024-01-03T21:24:56Z
Modified: 2024-01-03T21:24:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-cfph-4qqh-w828/GHSA-cfph-4qqh-w828.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-cfph-4qqh-w828
Finding: F039
Auto approve: 1