Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-7080— Arbitrary remote code execution within wrangler dev Workers sandbox

CVSS 8.5 · High EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-7080

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Arbitrary remote code execution within wrangler dev Workers sandbox
Source: NVD (National Vulnerability Database)
Vulnerability Description
The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. If wrangler dev --remote was being used, an attacker could access production resources if they were bound to the worker. This issue was fixed in wrangler@3.19.0 and wrangler@2.20.2. Whilst wrangler dev's inspector server listens on local interfaces by default as of wrangler@3.16.0, an SSRF vulnerability in miniflare https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7  (CVE-2023-7078) allowed access from the local network until wrangler@3.18.0. wrangler@3.19.0 and wrangler@2.20.2 introduced validation for the Origin/Host headers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权管理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cloudflare Wrangle 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cloudflare Wrangler是Cloudflare公司的一个存储库。 Cloudflare Wrangler 3.19.0之前版本存在安全漏洞,该漏洞源于存在任意代码执行漏洞,允许本地网络上的攻击者连接到检查器并运行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Cloudflarewrangler 0 ~ 3.0.0 -

II. Public POCs for CVE-2023-7080

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-7080

登录查看更多情报信息。

Same Patch Batch · Cloudflare · 2023-12-29 · 3 CVEs total

CVE-2023-70787.5 HIGHServer-Side Request Forgery (SSRF) in Miniflare
CVE-2023-70796.4 MEDIUMArbitrary remote file read in Wrangler dev server

IV. Related Vulnerabilities

V. Comments for CVE-2023-7080

No comments yet


Leave a comment