Description
An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.
Remediation
References
https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages
https://github.com/AgentME/browserify-hmr/issues/41
Related Vulnerabilities
CVE-2018-3752 Vulnerability in npm package merge-options
CVE-2016-0792 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2020-17510 Vulnerability in maven package org.apache.shiro:shiro-spring-boot-web-starter
CVE-2010-1870 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2020-17519 Vulnerability in maven package org.apache.flink:flink-runtime_2.12