First published: Fri Dec 29 2023(Updated: )
### Impact Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file. ### Patches This issue was fixed in `wrangler@3.19.0`. Wrangler will now only serve files that are part of your bundle, or referenced by your bundle's source maps. ### Workarounds Configure Wrangler to listen on local interfaces instead with `wrangler dev --ip 127.0.0.1`. This is the [default as of `wrangler@3.16.0`](https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf), and removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website. ### References - https://github.com/cloudflare/workers-sdk/pull/4532 - https://github.com/cloudflare/workers-sdk/pull/4535
Credit: cna@cloudflare.com cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/wrangler | >=3.9.0<3.19.0 | 3.19.0 |
Cloudflare Wrangler | >=3.9.0<3.19.0 | |
>=3.9.0<3.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7079 has a high severity due to its potential to expose sensitive files over the local network.
To fix CVE-2023-7079, update the Wrangler package to version 3.19.0 or later.
CVE-2023-7079 affects Wrangler versions between 3.9.0 and 3.19.0.
CVE-2023-7079 allows an attacker to access any file on the user's computer via specially crafted HTTP requests.
To protect yourself from CVE-2023-7079, avoid using affected versions of Wrangler and check for updates regularly.