Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1md3ZnLTI3MzktMjJ2N84AA4Gz
Miniflare vulnerable to Server-Side Request Forgery (SSRF)
Impact
Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler
until 3.19.0
), an attacker on the local network could access other local servers.
Patches
The issue was fixed in [email protected]
.
Workarounds
Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the host: "127.0.0.1"
option.
References Permalink: https://github.com/advisories/GHSA-fwvg-2739-22v7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1md3ZnLTI3MzktMjJ2N84AA4Gz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 11 months ago
Updated: 11 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Identifiers: GHSA-fwvg-2739-22v7, CVE-2023-7078
References:
- https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7
- https://nvd.nist.gov/vuln/detail/CVE-2023-7078
- https://github.com/cloudflare/workers-sdk/pull/4532
- https://github.com/advisories/GHSA-fwvg-2739-22v7
Blast Radius: 25.8
Affected Packages
npm:miniflare
Dependent packages: 132Dependent repositories: 2,754
Downloads: 3,432,240 last month
Affected Version Ranges: >= 3.20230821.0, < 3.20231030.2
Fixed in: 3.20231030.2
All affected versions: 3.20230821.0, 3.20230904.0, 3.20230918.0, 3.20230922.0, 3.20231002.0, 3.20231002.1, 3.20231010.0, 3.20231016.0, 3.20231023.0, 3.20231025.0, 3.20231025.1, 3.20231030.0, 3.20231030.1
All unaffected versions: 0.1.0, 0.1.1, 0.20230628.0, 0.20230908.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.4.0, 1.4.1, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.5.1, 2.6.0, 2.7.0, 2.7.1, 2.8.0, 2.8.1, 2.8.2, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.12.1, 2.12.2, 2.13.0, 2.14.0, 2.14.1, 2.14.2, 2.14.3, 2.14.4, 3.0.0, 3.0.1, 3.0.2, 3.20230628.0, 3.20230710.0, 3.20230717.0, 3.20230724.0, 3.20230801.0, 3.20230801.1, 3.20230807.0, 3.20230814.1, 3.20231030.2, 3.20231030.3, 3.20231030.4, 3.20231218.0, 3.20231218.1, 3.20231218.2, 3.20231218.3, 3.20231218.4, 3.20240129.0, 3.20240129.1, 3.20240129.2, 3.20240129.3, 3.20240208.0, 3.20240223.0, 3.20240223.1, 3.20240304.0, 3.20240304.1, 3.20240304.2, 3.20240314.0, 3.20240320.0, 3.20240320.1, 3.20240329.0, 3.20240329.1, 3.20240403.0, 3.20240404.0, 3.20240405.0, 3.20240405.1, 3.20240405.2, 3.20240419.0, 3.20240419.1, 3.20240512.0, 3.20240524.0, 3.20240524.1, 3.20240524.2, 3.20240605.0, 3.20240610.0, 3.20240610.1, 3.20240620.0, 3.20240701.0, 3.20240712.0, 3.20240718.0, 3.20240718.1, 3.20240725.0, 3.20240806.0, 3.20240806.1, 3.20240821.0, 3.20240821.1, 3.20240821.2, 3.20240909.0, 3.20240909.1, 3.20240909.2, 3.20240909.3, 3.20240909.4, 3.20240909.5, 3.20240925.0, 3.20240925.1, 3.20241004.0, 3.20241011.0, 3.20241018.0, 3.20241022.0, 3.20241106.0, 3.20241106.1