Description
An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.
Remediation
References
https://github.com/AgentME/browserify-hmr/issues/41
https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages
Related Vulnerabilities
CVE-2020-15231 Vulnerability in maven package org.mapfish.print:print-servlet
CVE-2016-10572 Vulnerability in npm package mongodb-instance
CVE-2016-10735 Vulnerability in maven package org.webjars:bootstrap
CVE-2019-19771 Vulnerability in npm package bitcoimd-rpc
CVE-2018-20698 Vulnerability in maven package com.floragunn:search-guard-kibana-plugin