Description
Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.

Published: 2023-12-29
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the host: "127.0.0.1" option.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3202 Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.
Github GHSA Github GHSA GHSA-fwvg-2739-22v7 Miniflare vulnerable to Server-Side Request Forgery (SSRF)
History

No history.

Subscriptions

Cloudflare Miniflare
cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2024-08-26T20:31:04.794Z

Reserved: 2023-12-22T09:58:30.164Z

Link: CVE-2023-7078

cve-icon Vulnrichment

Updated: 2024-08-02T08:50:07.938Z

cve-icon NVD

Status : Modified

Published: 2023-12-29T12:15:47.537

Modified: 2024-11-21T08:45:12.253

Link: CVE-2023-7078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses