Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2024-0330 | Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. | 
|  Github GHSA | GHSA-cfph-4qqh-w828 | Arbitrary remote file read in Wrangler dev server | 
Solution
No solution given by the vendor.
Workaround
Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1. This is the default as of wrangler@3.16.0 https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf , and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.
No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2024-08-02T08:50:07.936Z
Reserved: 2023-12-22T09:59:49.428Z
Link: CVE-2023-7079
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2023-12-29T12:15:47.763
Modified: 2024-11-21T08:45:12.460
Link: CVE-2023-7079
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.