-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency wrangler to v2.20.2 [security] #1235
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/npm-wrangler-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Deploying daim with Cloudflare Pages
|
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
renovate
bot
changed the title
chore(deps): update dependency wrangler to v3 [security]
chore(deps): update dependency wrangler to v3 [security] - autoclosed
Aug 28, 2023
renovate
bot
changed the title
chore(deps): update dependency wrangler to v3 [security] - autoclosed
chore(deps): update dependency wrangler to v3 [security]
Aug 28, 2023
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
August 28, 2023 22:16
5f58125
to
e5c3791
Compare
renovate
bot
changed the title
chore(deps): update dependency wrangler to v3 [security]
chore(deps): update dependency wrangler to v2.20.1 [security]
Aug 31, 2023
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
August 31, 2023 17:00
e5c3791
to
332017e
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 7, 2023 07:41
332017e
to
b127468
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 7, 2023 11:13
b127468
to
f78d971
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 7, 2023 13:39
f78d971
to
6d98cd8
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 9, 2023 05:21
6d98cd8
to
6e958c1
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 11, 2023 07:40
6e958c1
to
03d279f
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
December 13, 2023 03:51
03d279f
to
91b391b
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 3, 2024 22:51
91b391b
to
52682c6
Compare
renovate
bot
changed the title
chore(deps): update dependency wrangler to v2.20.1 [security]
chore(deps): update dependency wrangler to v2.20.2 [security]
Jan 3, 2024
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 16, 2024 00:53
52682c6
to
d8da2b4
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 23, 2024 00:15
d8da2b4
to
e788b15
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 23, 2024 01:00
e788b15
to
550fb41
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 23, 2024 05:06
550fb41
to
36d9f67
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
January 25, 2024 01:24
36d9f67
to
836689e
Compare
renovate
bot
changed the title
chore(deps): update dependency wrangler to v2.20.2 [security]
chore(deps): update dependency wrangler to v2.20.2 [security] - autoclosed
Feb 24, 2024
renovate
bot
changed the title
chore(deps): update dependency wrangler to v2.20.2 [security] - autoclosed
chore(deps): update dependency wrangler to v2.20.2 [security]
Feb 24, 2024
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
February 24, 2024 05:35
836689e
to
7b8ef91
Compare
renovate
bot
force-pushed
the
renovate/npm-wrangler-vulnerability
branch
from
March 28, 2024 04:53
7b8ef91
to
12e6b52
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.13.0
->2.20.2
GitHub Vulnerability Alerts
CVE-2023-3348
Impact
The Wrangler command line tool (<[email protected] or <[email protected]) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.
Patches
Wrangler2: Upgrade to v2.20.1 or higher.
Wrangler3: Upgrade to v3.1.1 or higher.
References
Workers SDK on Github
Wrangler docs
CVE-2023-3348
CVE-2023-7080
Impact
The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging.
wrangler dev
would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validateOrigin
/Host
headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. Ifwrangler dev --remote
was being used, an attacker could access production resources if they were bound to the worker.Patches
This issue was fixed in
[email protected]
and[email protected]
. Whilstwrangler dev
's inspector server listens on local interfaces by default as of[email protected]
, an SSRF vulnerability inminiflare
allowed access from the local network until[email protected]
.[email protected]
and[email protected]
introduced validation for theOrigin
/Host
headers.Workarounds
Unfortunately, Wrangler doesn't provide any configuration for which host that inspector server should listen on. Please upgrade to at least
[email protected]
, and configure Wrangler to listen on local interfaces instead withwrangler dev --ip 127.0.0.1
to prevent SSRF. This removes the local network as an attack vector, but does not prevent an attack from visiting a malicious website.References
Release Notes
cloudflare/workers-sdk (wrangler)
v2.20.2
Compare Source
Patch Changes
#4609
c228c912
Thanks @mrbbot! - fix: pinworkerd
to1.20230404.0
#4587
49a46960
Thanks @mrbbot! - Change dev registry and inspector server to listen on 127.0.0.1 instead of all interfaces#4587
49a46960
Thanks @mrbbot! - fix: validateHost
andOrgin
headers where appropriateHost
andOrigin
headers are now checked when connecting to the inspector proxy. If these don't match what's expected, the request will fail.v2.20.1
Compare Source
Patch Changes
546c2319
Thanks @GregBrimble! - fix: Preventwrangler pages dev
from serving asset files outside of the build output directoryv2.20.0
Compare Source
Minor Changes
e351afcf
Thanks @GregBrimble! - feat: Add support for the undocumented_worker.js/
directory in Pages#3095
133c0423
Thanks @zebp! - feat: add support for placement in wrangler configAllows a
placement
object in the wrangler config with a mode ofoff
orsmart
to configure Smart placement. Enabling Smart Placement can be done in yourwrangler.toml
like:#3140
5fd080c8
Thanks @penalosa! - feat: Support sourcemaps in DevToolsIntercept requests from DevTools in Wrangler to inject sourcemaps and enable folders in the Sources Panel of DevTools. When errors are thrown in your Worker, DevTools should now show your source file in the Sources panel, rather than Wrangler's bundled output.
Patch Changes
#2912
5079f476
Thanks @petebacondarwin! - fix: do not render "value of stdout.lastframe() is undefined" if the output is an empty stringFixes #2907
d0788008
Thanks @dario-piotrowicz! - fix pages building not taking into account the nodejs_compat flag (and improve the related error message)5b234cfd
Thanks @jspspike! - Added output for tail being in "sampling mode"v2.19.0
Compare Source
Minor Changes
c32f514c
Thanks @edevil! - Added initial commands for integrating with Constellation AI.v2.18.0
Compare Source
Minor Changes
#3098
8818f551
Thanks @mrbbot! - fix: improve Workers Sites asset upload reliabilityToo many bulk operations already in progress
error.WRANGLER_LOG=debug
environment variable. A splash of colour has also been added.v2.17.0
Compare Source
Minor Changes
#3004
6d5000a7
Thanks @rozenmd! - feat: teachwrangler docs
to use algolia search indexThis PR lets you search Cloudflare's entire docs via
wrangler docs [search term here]
.By default, if the search fails to find what you're looking for, you'll get an error like this:
If you provide the
--yes
or-y
flag, wrangler will open the docs to https://developers.cloudflare.com/workers/wrangler/commands/, even if the search fails.v2.16.0
Compare Source
Minor Changes
#3058
1bd50f56
Thanks @mrbbot! - chore: upgrademiniflare@3
to3.0.0-next.13
Notably, this adds native support for Windows to
wrangler dev --experimental-local
, logging for incoming requests, and support for a bunch of newer R2 features.Patch Changes
#3058
1bd50f56
Thanks @mrbbot! - fix: disable persistence without--persist
in--experimental-local
This ensures
--experimental-local
doesn't persist data on the file-system, unless the--persist
flag is set.Data is still always persisted between reloads.
#3055
5f48c405
Thanks @rozenmd! - fix: Teach D1 commands to read auth configuration from wrangler.tomlThis PR fixes a bug in how D1 handles a user's accounts. We've updated the D1 commands to read from config (typically via wrangler.toml) before trying to run commands. This means if an
account_id
is defined in config, we'll use that instead of erroring out when there are multiple accounts to pick from.Fixes #3046
#3058
1bd50f56
Thanks @mrbbot! - fix: disable route validation when using--experimental-local
This ensures
wrangler dev --experimental-local
doesn't require a login or an internet connection if aroute
is configured.v2.15.1
Compare Source
Patch Changes
4c55baf9
Thanks @GregBrimble! - feat: Add**/*.wasm?module
as default module rule (alias of**/*.wasm
)86e942bb
Thanks @GregBrimble! - fix: Durable Object proxying websockets over local dev registryv2.15.0
Compare Source
Minor Changes
#2769
0a779904
Thanks @penalosa! - feature: Support modules with--no-bundle
When the
--no-bundle
flag is set, Wrangler now has support for uploading additional modules alongside the entrypoint. This will allow modules to be imported at runtime on Cloudflare's Edge. This respects Wrangler's module rules configuration, which means that only imports of non-JS modules will trigger an upload by default. For instance, the following code will now work with--no-bundle
(assuming theexample.wasm
file exists at the correct path):For JS modules, it's necessary to specify an additional module rule (or rules) in your
wrangler.toml
to configure your modules as ES modules or Common JS modules. For instance, to upload additional JavaScript files as ES modules, add the following module rule to yourwrangler.toml
, which tells Wrangler that all**/*.js
files are ES modules.If you have Common JS modules, you'd configure Wrangler with a CommonJS rule (the following rule tells Wrangler that all
.cjs
files are Common JS modules):In most projects, adding a single rule will be sufficient. However, for advanced usecases where you're mixing ES modules and Common JS modules, you'll need to use multiple rule definitions. For instance, the following set of rules will match all
.mjs
files as ES modules, all.cjs
files as Common JS modules, and thenested/say-hello.js
file as Common JS.If multiple rules overlap, Wrangler will log a warning about the duplicate rules, and will discard additional rules that matches a module. For example, the following rule configuration classifies
dep.js
as both a Common JS module and an ES module:Wrangler will treat
dep.js
as a Common JS module, since that was the first rule that matched, and will log the following warning:This also adds a new configuration option to
wrangler.toml
:base_dir
. Defaulting to the directory of your Worker's main entrypoint, this tells Wrangler where your additional modules are located, and determines the module paths against which your module rule globs are matched.For instance, given the following directory structure:
If your
wrangler.toml
hadmain = "src/js/index.js"
, you would need to setbase_dir = "src"
in order to be able to importsrc/vendor/dependency.js
andsrc/index.html
fromsrc/js/index.js
.Patch Changes
#2957
084b2c58
Thanks @esimons! - fix: Respect querystring params when calling.fetch
on a worker instantiated withunstable_dev
Previously, querystring params would be stripped, causing issues for test cases that depended on them. For example, given the following worker script:
would fail the following test case:
#2840
e311bbbf
Thanks @mrbbot! - fix: makeWRANGLER_LOG
case-insensitive, warn on unexpected values, and fallback tolog
if invalidPreviously, levels set via the
WRANGLER_LOG
environment-variable were case-sensitive.If an unexpected level was set, Wrangler would fallback to
none
, hiding all logs.The fallback has now been switched to
log
, and lenient case-insensitive matching is used when setting the level.eebad0d9
Thanks @kuba-orlik! - fix: allow programmatic dev workers to be stopped and started in a single session3f7a75cc
Thanks @JacobMGEvans! - Fix: Generate Remote URLPrevious URL was pointing to the old cloudflare/templates repo,
updated the URL to point to templates in the workers-sdk monorepo.
v2.14.0
Compare Source
Minor Changes
dc1465ea
Thanks @mrbbot! - chore: upgrademiniflare
to2.13.0
#2914
9af1a640
Thanks @edevil! - feat: add support for send email bindingsSupport send email bindings in order to send emails from a worker. There
are three types of bindings:
does not need to be specified when sending the email but also needs to be a
verified destination address).
addresses.
Patch Changes
#2931
5f6c4c0c
Thanks @Skye-31! - Fix: Pages Dev incorrectly allowing people to turn off local modeLocal mode is not currently supported in Pages Dev, and errors when people attempt to use it. Previously, wrangler hid the "toggle local mode" button when using Pages dev, but this got broken somewhere along the line.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.