Lucene search

K
osvGoogleOSV:GHSA-CFPH-4QQH-W828
HistoryJan 03, 2024 - 9:24 p.m.

Arbitrary remote file read in Wrangler dev server

2024-01-0321:24:56
Google
osv.dev
3
wrangler
remote file read
vulnerability
security patch
local network configuration

6.4 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.9%

Impact

Sending specially crafted HTTP requests and inspector messages to Wrangler’s dev server could result in any file on the user’s computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

Patches

This issue was fixed in [email protected]. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle’s source maps.

Workarounds

Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1. This is the default as of [email protected], and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.

References

CPENameOperatorVersion
wranglerge3.9.0
wranglerlt3.19.0

6.4 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.9%

Related for OSV:GHSA-CFPH-4QQH-W828