Description
An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.
Remediation
References
https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages
https://github.com/AgentME/browserify-hmr/issues/41
Related Vulnerabilities
CVE-2019-14517 Vulnerability in npm package editor.md
CVE-2021-21350 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2020-7604 Vulnerability in npm package pulverizr
CVE-2022-29244 Vulnerability in npm package npm
CVE-2023-39155 Vulnerability in maven package org.jenkins-ci.plugins:chef-identity