Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: wrangler

Found 3 matching suggestions

Published
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • vscode-extensions.ms-toolsai.datawrangler
    • python312Packages.awswrangler
    • python313Packages.awswrangler
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OS Command Injection in `wrangler pages deploy`

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Affected products

Wrangler
  • =<v4.59.0
  • =<v3.114.16
  • ==v2.0.15+

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-36p8-mvp6-cv38
Untriaged
created 5 months ago
Arbitrary remote code execution within wrangler dev Workers sandbox

The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. If wrangler dev --remote was being used, an attacker could access production resources if they were bound to the worker. This issue was fixed in wrangler@3.19.0 and wrangler@2.20.2. Whilst wrangler dev's inspector server listens on local interfaces by default as of wrangler@3.16.0, an SSRF vulnerability in miniflare https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7  (CVE-2023-7078) allowed access from the local network until wrangler@3.18.0. wrangler@3.19.0 and wrangler@2.20.2 introduced validation for the Origin/Host headers.

Affected products

wrangler
  • =<2.0.0
  • =<3.0.0
  • <3.19.0
  • <2.20.2

Matching in nixpkgs

pkgs.wrangler

Command-line interface for all things Cloudflare Workers

  • nixos-unstable -

pkgs.wrangler_1

CLI tool designed for folks who are interested in using Cloudflare Workers

  • nixos-unstable -

Package maintainers

Untriaged
created 5 months ago
Arbitrary remote file read in Wrangler dev server

Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

Affected products

wrangler
  • =<3.9.0
  • <3.19.0

Matching in nixpkgs

pkgs.wrangler

Command-line interface for all things Cloudflare Workers

  • nixos-unstable -

pkgs.wrangler_1

CLI tool designed for folks who are interested in using Cloudflare Workers

  • nixos-unstable -

Package maintainers