First published: Thu Aug 03 2023(Updated: )
### Impact The Wrangler command line tool (<=wrangler@3.1.0 or <=wrangler@2.20.1) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server. ### Patches Wrangler2: Upgrade to v2.20.1 or higher. Wrangler3: Upgrade to v3.1.1 or higher. ### References [Workers SDK on Github](https://github.com/cloudflare/workers-sdk) [Wrangler docs](https://developers.cloudflare.com/workers/wrangler/) [CVE-2023-3348](https://www.cve.org/CVERecord?id=CVE-2023-3348)
Credit: cna@cloudflare.com cna@cloudflare.com cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudflare Wrangler | <3.1.1 |
Upgrade to wrangler@3.1.1 or higher For wrangler v2 upgrade to wrangler@2.20.1 or higher
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2023-3348 is a directory traversal vulnerability in the Wrangler command line tool.
Vulnerability CVE-2023-3348 allows an attacker in the same network as the victim to connect to local development servers and potentially access sensitive files.
Versions wrangler@3.1.0 and wrangler@2.20.1 of the Wrangler command line tool are affected.
Vulnerability CVE-2023-3348 has a severity rating of medium with a CVSS score of 5.7.
Users should upgrade their Wrangler command line tool to version 3.1.1 or higher to fix vulnerability CVE-2023-3348.