WebSocket Server Origin Validation Bypass in Browserify-HMR

WebSocket Server Origin Validation Bypass in Browserify-HMR

CVE-2018-14730 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.

Learn more about our Web App Pen Testing.