Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3202 Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.
Github GHSA Github GHSA GHSA-fwvg-2739-22v7 Miniflare vulnerable to Server-Side Request Forgery (SSRF)
Fixes

Solution

No solution given by the vendor.


Workaround

Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the host: "127.0.0.1" option.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2024-08-26T20:31:04.794Z

Reserved: 2023-12-22T09:58:30.164Z

Link: CVE-2023-7078

cve-icon Vulnrichment

Updated: 2024-08-02T08:50:07.938Z

cve-icon NVD

Status : Modified

Published: 2023-12-29T12:15:47.537

Modified: 2024-11-21T08:45:12.253

Link: CVE-2023-7078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.