Description
An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.
Remediation
References
https://github.com/AgentME/browserify-hmr/issues/41
https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages
Related Vulnerabilities
CVE-2023-45648 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2019-19771 Vulnerability in npm package bitconijs-lib
CVE-2017-16192 Vulnerability in npm package getcityapi.yoehoehne
CVE-2018-3732 Vulnerability in npm package resolve-path
CVE-2020-2230 Vulnerability in maven package org.jenkins-ci.main:jenkins-core