GHSA-cfph-4qqh-w828

Suggest an improvement
Source
https://github.com/advisories/GHSA-cfph-4qqh-w828
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-cfph-4qqh-w828/GHSA-cfph-4qqh-w828.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cfph-4qqh-w828
Aliases
Related
Published
2024-01-03T21:24:56Z
Modified
2024-01-03T21:41:45.305333Z
Severity
  • 6.9 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N CVSS Calculator
Summary
Arbitrary remote file read in Wrangler dev server
Details

Impact

Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

Patches

This issue was fixed in wrangler@3.19.0. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps.

Workarounds

Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1. This is the default as of wrangler@3.16.0, and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.

References

  • https://github.com/cloudflare/workers-sdk/pull/4532
  • https://github.com/cloudflare/workers-sdk/pull/4535
Database specific
{
    "nvd_published_at": "2023-12-29T12:15:47Z",
    "cwe_ids": [
        "CWE-287"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-03T21:24:56Z"
}
References

Affected packages

npm / wrangler

Package

Affected ranges

Type
SEMVER
Events
Introduced
3.9.0
Fixed
3.19.0