GHSA-fwvg-2739-22v7
GitHub Security Advisory
Miniflare vulnerable to Server-Side Request Forgery (SSRF)
Advisory Details
### Impact
Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in `wrangler` until `3.19.0`), an attacker on the local network could access other local servers.
### Patches
The issue was fixed in `[email protected]`.
### Workarounds
Ensure Miniflare is configured to listen on just local interfaces. This is the default behaviour, but can also be configured with the `host: "127.0.0.1"` option.
### References
- https://github.com/cloudflare/workers-sdk/pull/4532
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.