Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0330 Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
Github GHSA Github GHSA GHSA-cfph-4qqh-w828 Arbitrary remote file read in Wrangler dev server
Fixes

Solution

No solution given by the vendor.


Workaround

Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1. This is the default as of wrangler@3.16.0 https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf , and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cloudflare

Published:

Updated: 2024-08-02T08:50:07.936Z

Reserved: 2023-12-22T09:59:49.428Z

Link: CVE-2023-7079

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-29T12:15:47.763

Modified: 2024-11-21T08:45:12.460

Link: CVE-2023-7079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.