6.4 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
6.7 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.9%
Sending specially crafted HTTP requests and inspector messages to Wrangler’s dev server could result in any file on the user’s computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
This issue was fixed in [email protected]
. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle’s source maps.
Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1
. This is the default as of [email protected]
, and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.
github.com/cloudflare/workers-sdk
github.com/cloudflare/workers-sdk/commit/29df8e17545bf3926b6d61678b596be809d40c6d
github.com/cloudflare/workers-sdk/commit/311ffbd5064f8301ac6f0311bbe5630897923b93
github.com/cloudflare/workers-sdk/pull/4532
github.com/cloudflare/workers-sdk/pull/4535
github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828
nvd.nist.gov/vuln/detail/CVE-2023-7079
6.4 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
6.7 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.9%