Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-7079", "assignerOrgId": "a22f1246-ba21-4bb4-a601-ad51614c1513", "state": "PUBLISHED", "assignerShortName": "cloudflare", "dateReserved": "2023-12-22T09:59:49.428Z", "datePublished": "2023-12-29T11:54:08.925Z", "dateUpdated": "2024-08-02T08:50:07.936Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "packageName": "wrangler", "platforms": ["Windows", "MacOS", "Linux"], "product": "wrangler", "repo": "https://github.com/cloudflare/workers-sdk", "vendor": "Cloudflare", "versions": [{"changes": [{"at": "3.19.0", "status": "unaffected"}], "lessThanOrEqual": "3.9.0", "status": "affected", "version": "0", "versionType": "patch"}, {"changes": [{"at": "3.19.0", "status": "unaffected"}], "lessThan": "3.19.0", "status": "affected", "version": "0", "versionType": "patch"}]}], "credits": [{"lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": " Peter Wu (Lekensteyn)"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.<br>"}], "value": "Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.\n"}], "impacts": [{"capecId": "CAPEC-593", "descriptions": [{"lang": "en", "value": "CAPEC-593 Session Hijacking"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "a22f1246-ba21-4bb4-a601-ad51614c1513", "shortName": "cloudflare", "dateUpdated": "2023-12-29T12:08:49.883Z"}, "references": [{"url": "https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828"}, {"url": "https://github.com/cloudflare/workers-sdk/pull/4532"}, {"url": "https://github.com/cloudflare/workers-sdk/pull/4535"}], "source": {"discovery": "INTERNAL"}, "title": "Arbitrary remote file read in Wrangler dev server", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Configure Wrangler to listen on local interfaces instead with <code><b>wrangler dev --ip 127.0.0.1</b></code>. This is the <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf\">default as of <code>wrangler@3.16.0</code></a>, and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.</p>"}], "value": "Configure Wrangler to listen on local interfaces instead with wrangler dev --ip 127.0.0.1. This is the default as of wrangler@3.16.0 https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf , and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.\n\n"}], "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T08:50:07.936Z"}, "title": "CVE Program Container", "references": [{"url": "https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828", "tags": ["x_transferred"]}, {"url": "https://github.com/cloudflare/workers-sdk/pull/4532", "tags": ["x_transferred"]}, {"url": "https://github.com/cloudflare/workers-sdk/pull/4535", "tags": ["x_transferred"]}]}]}}