Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1md3ZnLTI3MzktMjJ2N84AA4Gz

Miniflare vulnerable to Server-Side Request Forgery (SSRF)

Impact

Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.

Patches

The issue was fixed in [email protected].

Workarounds

Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the host: "127.0.0.1" option.

References

Permalink: https://github.com/advisories/GHSA-fwvg-2739-22v7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1md3ZnLTI3MzktMjJ2N84AA4Gz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 11 months ago
Updated: 11 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

Identifiers: GHSA-fwvg-2739-22v7, CVE-2023-7078
References: Repository: https://github.com/cloudflare/workers-sdk
Blast Radius: 25.8

Affected Packages

npm:miniflare
Dependent packages: 132
Dependent repositories: 2,754
Downloads: 3,432,240 last month
Affected Version Ranges: >= 3.20230821.0, < 3.20231030.2
Fixed in: 3.20231030.2
All affected versions: 3.20230821.0, 3.20230904.0, 3.20230918.0, 3.20230922.0, 3.20231002.0, 3.20231002.1, 3.20231010.0, 3.20231016.0, 3.20231023.0, 3.20231025.0, 3.20231025.1, 3.20231030.0, 3.20231030.1
All unaffected versions: 0.1.0, 0.1.1, 0.20230628.0, 0.20230908.0, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.4.0, 1.4.1, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.5.1, 2.6.0, 2.7.0, 2.7.1, 2.8.0, 2.8.1, 2.8.2, 2.9.0, 2.10.0, 2.11.0, 2.12.0, 2.12.1, 2.12.2, 2.13.0, 2.14.0, 2.14.1, 2.14.2, 2.14.3, 2.14.4, 3.0.0, 3.0.1, 3.0.2, 3.20230628.0, 3.20230710.0, 3.20230717.0, 3.20230724.0, 3.20230801.0, 3.20230801.1, 3.20230807.0, 3.20230814.1, 3.20231030.2, 3.20231030.3, 3.20231030.4, 3.20231218.0, 3.20231218.1, 3.20231218.2, 3.20231218.3, 3.20231218.4, 3.20240129.0, 3.20240129.1, 3.20240129.2, 3.20240129.3, 3.20240208.0, 3.20240223.0, 3.20240223.1, 3.20240304.0, 3.20240304.1, 3.20240304.2, 3.20240314.0, 3.20240320.0, 3.20240320.1, 3.20240329.0, 3.20240329.1, 3.20240403.0, 3.20240404.0, 3.20240405.0, 3.20240405.1, 3.20240405.2, 3.20240419.0, 3.20240419.1, 3.20240512.0, 3.20240524.0, 3.20240524.1, 3.20240524.2, 3.20240605.0, 3.20240610.0, 3.20240610.1, 3.20240620.0, 3.20240701.0, 3.20240712.0, 3.20240718.0, 3.20240718.1, 3.20240725.0, 3.20240806.0, 3.20240806.1, 3.20240821.0, 3.20240821.1, 3.20240821.2, 3.20240909.0, 3.20240909.1, 3.20240909.2, 3.20240909.3, 3.20240909.4, 3.20240909.5, 3.20240925.0, 3.20240925.1, 3.20241004.0, 3.20241011.0, 3.20241018.0, 3.20241022.0, 3.20241106.0, 3.20241106.1