Arbitrary remote file read in Wrangler dev server
Moderate severity
GitHub Reviewed
Published
Dec 29, 2023
in
cloudflare/workers-sdk
•
Updated Jan 3, 2024
Description
Published by the National Vulnerability Database
Dec 29, 2023
Published to the GitHub Advisory Database
Jan 3, 2024
Reviewed
Jan 3, 2024
Last updated
Jan 3, 2024
Impact
Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
Patches
This issue was fixed in
[email protected]
. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps.Workarounds
Configure Wrangler to listen on local interfaces instead with
wrangler dev --ip 127.0.0.1
. This is the default as of[email protected]
, and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.References
References