Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-3348", "assignerOrgId": "a22f1246-ba21-4bb4-a601-ad51614c1513", "state": "PUBLISHED", "assignerShortName": "cloudflare", "dateReserved": "2023-06-21T07:20:37.335Z", "datePublished": "2023-08-03T13:47:07.296Z", "dateUpdated": "2024-10-09T20:34:14.644Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Wrangler", "vendor": "Cloudflare", "versions": [{"changes": [{"at": "3.1.1", "status": "unaffected"}], "lessThan": "3.1.1", "status": "affected", "version": "3", "versionType": "semver"}, {"changes": [{"at": "2.20.1", "status": "unaffected"}], "lessThan": "2.20.1", "status": "affected", "version": "2", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "robocap42 (HackerOne researcher)"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<div><div>The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.</div></div>"}], "value": "The Wrangler command line tool\u00a0 (<=wrangler@3.1.0 or <=wrangler@2.20.1)\u00a0was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.\n\n\n\n"}], "impacts": [{"capecId": "CAPEC-126", "descriptions": [{"lang": "en", "value": "CAPEC-126 Path Traversal"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "a22f1246-ba21-4bb4-a601-ad51614c1513", "shortName": "cloudflare", "dateUpdated": "2023-08-29T09:17:49.419Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp"}, {"tags": ["product"], "url": "https://github.com/cloudflare/workers-sdk"}, {"tags": ["related"], "url": "https://developers.cloudflare.com/workers/wrangler/"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Upgrade to wrangler@3.1.1 or higher<br>For wrangler v2 upgrade to wrangler@2.20.1 or higher"}], "value": "Upgrade to wrangler@3.1.1 or higher\nFor wrangler v2 upgrade to wrangler@2.20.1 or higher"}], "source": {"discovery": "EXTERNAL"}, "title": "Directory traversal vulnerability in Cloudflare Wrangler", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T06:55:03.253Z"}, "title": "CVE Program Container", "references": [{"tags": ["vendor-advisory", "x_transferred"], "url": "https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp"}, {"tags": ["product", "x_transferred"], "url": "https://github.com/cloudflare/workers-sdk"}, {"tags": ["related", "x_transferred"], "url": "https://developers.cloudflare.com/workers/wrangler/"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-09T20:30:56.298602Z", "id": "CVE-2023-3348", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-09T20:34:14.644Z"}}]}}