Description
An issue was discovered in Browserify-HMR. Attackers are able to steal developer's code because the origin of requests is not checked by the WebSocket server, which is used for HMR (Hot Module Replacement). Anyone can receive the HMR message sent by the WebSocket server via a ws://127.0.0.1:3123/ connection from any origin.
Remediation
References
https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages
https://github.com/AgentME/browserify-hmr/issues/41
Related Vulnerabilities
CVE-2015-2944 Vulnerability in maven package org.apache.sling:org.apache.sling.servlets.post
CVE-2019-14862 Vulnerability in maven package li.rudin.mavenjs:knockout
CVE-2020-7611 Vulnerability in maven package io.micronaut:micronaut-http-client
CVE-2019-17570 Vulnerability in maven package org.apache.xmlrpc:xmlrpc