All the vulnerabilites related to vercel - next.js
cve-2022-21721
Vulnerability from cvelistv5
Published
2022-01-28 22:00
Modified
2024-08-03 02:53
Severity ?
EPSS score ?
Summary
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/pull/33503 | x_refsource_MISC | |
https://github.com/vercel/next.js/releases/tag/v12.0.9 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:53:35.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/pull/33503" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.0.9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-28T22:00:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/pull/33503" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.0.9" } ], "source": { "advisory": "GHSA-wr66-vrwm-5g5x", "discovery": "UNKNOWN" }, "title": "DOS Vulnerability in next.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21721", "STATE": "PUBLIC", "TITLE": "DOS Vulnerability in next.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x" }, { "name": "https://github.com/vercel/next.js/pull/33503", "refsource": "MISC", "url": "https://github.com/vercel/next.js/pull/33503" }, { "name": "https://github.com/vercel/next.js/releases/tag/v12.0.9", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v12.0.9" } ] }, "source": { "advisory": "GHSA-wr66-vrwm-5g5x", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21721", "datePublished": "2022-01-28T22:00:17", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:53:35.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51479
Vulnerability from cvelistv5
Published
2024-12-17 18:13
Modified
2024-12-17 20:36
Severity ?
EPSS score ?
Summary
Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/releases/tag/v14.2.15 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51479", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T20:36:20.367589Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-17T20:36:28.402Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 9.5.5, \u003c 14.2.15" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application\u0027s root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T18:13:02.806Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-7gfc-8cq8-jh5f" }, { "name": "https://github.com/vercel/next.js/releases/tag/v14.2.15", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v14.2.15" } ], "source": { "advisory": "GHSA-7gfc-8cq8-jh5f", "discovery": "UNKNOWN" }, "title": "Authorization bypass in Next.js" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-51479", "datePublished": "2024-12-17T18:13:02.806Z", "dateReserved": "2024-10-28T14:20:59.335Z", "dateUpdated": "2024-12-17T20:36:28.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46298
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-12 17:50
Severity ?
EPSS score ?
Summary
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:45:40.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/vercel/next.js/pull/54732" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vercel/next.js/issues/45301" }, { "tags": [ "x_transferred" ], "url": "https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46298", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T17:50:22.570271Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T17:50:34.208Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-22T02:53:32.509761", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/vercel/next.js/pull/54732" }, { "url": "https://github.com/vercel/next.js/issues/45301" }, { "url": "https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-46298", "datePublished": "2023-10-22T00:00:00", "dateReserved": "2023-10-22T00:00:00", "dateUpdated": "2024-09-12T17:50:34.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43803
Vulnerability from cvelistv5
Published
2021-12-09 23:50
Modified
2024-08-04 04:03
Severity ?
EPSS score ?
Summary
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/pull/32080 | x_refsource_MISC | |
https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264 | x_refsource_MISC | |
https://github.com/vercel/next.js/releases/tag/v11.1.3 | x_refsource_MISC | |
https://github.com/vercel/next.js/releases/v12.0.5 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/pull/32080" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/v12.0.5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 11.1.0, \u003c 11.1.3" }, { "status": "affected", "version": "\u003e= 12.0.0, \u003c 12.0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-09T23:50:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/pull/32080" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/v12.0.5" } ], "source": { "advisory": "GHSA-25mp-g6fv-mqxx", "discovery": "UNKNOWN" }, "title": "Unexpected server crash in Next.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-43803", "STATE": "PUBLIC", "TITLE": "Unexpected server crash in Next.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "\u003e= 11.1.0, \u003c 11.1.3" }, { "version_value": "\u003e= 12.0.0, \u003c 12.0.5" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx" }, { "name": "https://github.com/vercel/next.js/pull/32080", "refsource": "MISC", "url": "https://github.com/vercel/next.js/pull/32080" }, { "name": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264", "refsource": "MISC", "url": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264" }, { "name": "https://github.com/vercel/next.js/releases/tag/v11.1.3", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v11.1.3" }, { "name": "https://github.com/vercel/next.js/releases/v12.0.5", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/v12.0.5" } ] }, "source": { "advisory": "GHSA-25mp-g6fv-mqxx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-43803", "datePublished": "2021-12-09T23:50:10", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-04T04:03:08.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39178
Vulnerability from cvelistv5
Published
2021-08-30 23:55
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/releases/tag/v11.1.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.141Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 11.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-30T23:55:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.1" } ], "source": { "advisory": "GHSA-9gr3-7897-pp7m", "discovery": "UNKNOWN" }, "title": "XSS in Image Optimization API for Next.js versions between 10.0.0 and 11.1.0", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39178", "STATE": "PUBLIC", "TITLE": "XSS in Image Optimization API for Next.js versions between 10.0.0 and 11.1.0" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "\u003e= 10.0.0, \u003c 11.1.1" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m" }, { "name": "https://github.com/vercel/next.js/releases/tag/v11.1.1", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v11.1.1" } ] }, "source": { "advisory": "GHSA-9gr3-7897-pp7m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39178", "datePublished": "2021-08-30T23:55:09", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.141Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39693
Vulnerability from cvelistv5
Published
2024-07-10 19:54
Modified
2024-11-05 14:40
Severity ?
EPSS score ?
Summary
Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*" ], "defaultStatus": "unknown", "product": "next.js", "vendor": "vercel", "versions": [ { "lessThan": "13.5.0", "status": "affected", "version": "13.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39693", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-11T14:15:26.573358Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-11T18:07:28.029Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 13.3.1, \u003c 13.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:40:42.493Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42" } ], "source": { "advisory": "GHSA-fq54-2j52-jc42", "discovery": "UNKNOWN" }, "title": "Next.js Denial of Service (DoS) condition" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39693", "datePublished": "2024-07-10T19:54:10.773Z", "dateReserved": "2024-06-27T18:44:13.036Z", "dateUpdated": "2024-11-05T14:40:42.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23646
Vulnerability from cvelistv5
Published
2022-02-17 20:35
Modified
2024-08-03 03:51
Severity ?
EPSS score ?
Summary
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/pull/34075 | x_refsource_MISC | |
https://github.com/vercel/next.js/releases/tag/v12.1.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:45.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/pull/34075" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 12.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-451", "description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-17T20:35:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/pull/34075" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" } ], "source": { "advisory": "GHSA-fmvm-x8mv-47mj", "discovery": "UNKNOWN" }, "title": "Improper CSP in Image Optimization API for Next.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-23646", "STATE": "PUBLIC", "TITLE": "Improper CSP in Image Optimization API for Next.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "\u003e= 10.0.0, \u003c 12.1.0" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-451: User Interface (UI) Misrepresentation of Critical Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" }, { "name": "https://github.com/vercel/next.js/pull/34075", "refsource": "MISC", "url": "https://github.com/vercel/next.js/pull/34075" }, { "name": "https://github.com/vercel/next.js/releases/tag/v12.1.0", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" } ] }, "source": { "advisory": "GHSA-fmvm-x8mv-47mj", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23646", "datePublished": "2022-02-17T20:35:12", "dateReserved": "2022-01-19T00:00:00", "dateUpdated": "2024-08-03T03:51:45.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37699
Vulnerability from cvelistv5
Published
2021-08-11 23:15
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9 | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/releases/tag/v11.1.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.488Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003c 11.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker\u0027s domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T23:15:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.0" } ], "source": { "advisory": "GHSA-vxf5-wxwp-m7g9", "discovery": "UNKNOWN" }, "title": "Open Redirect in Next.js versions below 11.1.0", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37699", "STATE": "PUBLIC", "TITLE": "Open Redirect in Next.js versions below 11.1.0" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "\u003c 11.1.0" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker\u0027s domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9" }, { "name": "https://github.com/vercel/next.js/releases/tag/v11.1.0", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v11.1.0" } ] }, "source": { "advisory": "GHSA-vxf5-wxwp-m7g9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37699", "datePublished": "2021-08-11T23:15:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34350
Vulnerability from cvelistv5
Published
2024-05-09 16:07
Modified
2024-08-02 02:51
Severity ?
EPSS score ?
Summary
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-34350", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-09T20:02:36.994972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:41:25.563Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:51:11.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 13.4.0, \u003c 13.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-09T16:07:44.499Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf" } ], "source": { "advisory": "GHSA-77r5-gw3j-2mpf", "discovery": "UNKNOWN" }, "title": "Next.js Vulnerable to HTTP Request Smuggling" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34350", "datePublished": "2024-05-09T16:07:44.499Z", "dateReserved": "2024-05-02T06:36:32.437Z", "dateUpdated": "2024-08-02T02:51:11.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-34351
Vulnerability from cvelistv5
Published
2024-05-09 16:14
Modified
2024-08-02 02:51
Severity ?
EPSS score ?
Summary
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/pull/62561 | x_refsource_MISC | |
https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vercel:next.js:13.4.0:*:*:*:*:node.js:*:*" ], "defaultStatus": "unknown", "product": "next.js", "vendor": "vercel", "versions": [ { "lessThan": "14.1.1", "status": "affected", "version": "13.4.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34351", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-10T18:01:14.735549Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:41:46.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:51:09.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g" }, { "name": "https://github.com/vercel/next.js/pull/62561", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/pull/62561" }, { "name": "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 13.4.0, \u003c 14.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-09T16:14:16.236Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g" }, { "name": "https://github.com/vercel/next.js/pull/62561", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/pull/62561" }, { "name": "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085" } ], "source": { "advisory": "GHSA-fr5h-rqp8-mj6g", "discovery": "UNKNOWN" }, "title": "Next.js Server-Side Request Forgery in Server Actions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34351", "datePublished": "2024-05-09T16:14:16.236Z", "dateReserved": "2024-05-02T06:36:32.438Z", "dateUpdated": "2024-08-02T02:51:09.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-56332
Vulnerability from cvelistv5
Published
2025-01-03 20:19
Modified
2025-01-03 20:51
Severity ?
EPSS score ?
Summary
Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. This vulnerability can also be used as a Denial of Wallet (DoW) attack when deployed in providers billing by response times. (Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.). Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel. This vulnerability affects only Next.js deployments using Server Actions. The issue was resolved in Next.js 13.5.8, 14.2.21, and 15.1.2. We recommend that users upgrade to a safe version. There are no official workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9 | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-56332", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-03T20:50:53.098540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-03T20:51:02.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 13.0.0, \u003c 13.5.8" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.2.21" }, { "status": "affected", "version": "\u003e= 15.0.0, \u003c 15.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. This vulnerability can also be used as a Denial of Wallet (DoW) attack when deployed in providers billing by response times. (Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.). Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel. This vulnerability affects only Next.js deployments using Server Actions. The issue was resolved in Next.js 13.5.8, 14.2.21, and 15.1.2. We recommend that users upgrade to a safe version. There are no official workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-03T20:19:11.525Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-7m27-7ghc-44w9" } ], "source": { "advisory": "GHSA-7m27-7ghc-44w9", "discovery": "UNKNOWN" }, "title": "Next.js Vulnerable to Denial of Service (DoS) with Server Actions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-56332", "datePublished": "2025-01-03T20:19:11.525Z", "dateReserved": "2024-12-19T18:39:53.612Z", "dateUpdated": "2025-01-03T20:51:02.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47831
Vulnerability from cvelistv5
Published
2024-10-14 18:04
Modified
2024-10-15 14:52
Severity ?
EPSS score ?
Summary
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47831", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T14:51:58.666402Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T14:52:10.465Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 14.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-674", "description": "CWE-674: Uncontrolled Recursion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T18:04:25.927Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m" }, { "name": "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a" } ], "source": { "advisory": "GHSA-g77x-44xx-532m", "discovery": "UNKNOWN" }, "title": "Next.js image optimization has Denial of Service condition" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47831", "datePublished": "2024-10-14T18:04:25.927Z", "dateReserved": "2024-10-03T14:06:12.643Z", "dateUpdated": "2024-10-15T14:52:10.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-46982
Vulnerability from cvelistv5
Published
2024-09-17 21:55
Modified
2024-09-18 13:45
Severity ?
EPSS score ?
Summary
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9 | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3 | x_refsource_MISC | |
https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*" ], "defaultStatus": "unknown", "product": "next.js", "vendor": "vercel", "versions": [ { "lessThan": "13.5.7", "status": "affected", "version": "13.5.1", "versionType": "custom" }, { "lessThan": "14.2.10", "status": "affected", "version": "14.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-46982", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:38:27.573625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:45:21.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 13.5.1, \u003c 13.5.7" }, { "status": "affected", "version": "\u003e= 14.0.0, \u003c 14.2.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, \u0026 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T21:55:04.312Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-gp8f-8m3g-qvj9" }, { "name": "https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/commit/7ed7f125e07ef0517a331009ed7e32691ba403d3" }, { "name": "https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/commit/bd164d53af259c05f1ab434004bcfdd3837d7cda" } ], "source": { "advisory": "GHSA-gp8f-8m3g-qvj9", "discovery": "UNKNOWN" }, "title": "Cache Poisoning in next.js" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-46982", "datePublished": "2024-09-17T21:55:04.312Z", "dateReserved": "2024-09-16T16:10:09.018Z", "dateUpdated": "2024-09-18T13:45:21.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36046
Vulnerability from cvelistv5
Published
2022-08-31 18:55
Modified
2024-08-03 09:52
Severity ?
EPSS score ?
Summary
Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn't being shared across requests.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3 | x_refsource_CONFIRM | |
https://github.com/vercel/next.js/releases/tag/v12.2.4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:52:00.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.2.4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "= 12.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn\u0027t being shared across requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248: Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-31T18:55:09", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.2.4" } ], "source": { "advisory": "GHSA-wff4-fpwg-qqv3", "discovery": "UNKNOWN" }, "title": "Unexpected server crash in Next.js version 12.2.3", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36046", "STATE": "PUBLIC", "TITLE": "Unexpected server crash in Next.js version 12.2.3" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "= 12.2.3" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn\u0027t being shared across requests." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-248: Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3" }, { "name": "https://github.com/vercel/next.js/releases/tag/v12.2.4", "refsource": "MISC", "url": "https://github.com/vercel/next.js/releases/tag/v12.2.4" } ] }, "source": { "advisory": "GHSA-wff4-fpwg-qqv3", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36046", "datePublished": "2022-08-31T18:55:09", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:52:00.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15242
Vulnerability from cvelistv5
Published
2020-10-08 19:50
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435 | x_refsource_CONFIRM | |
https://github.com/zeit/next.js/releases/tag/v9.5.4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:23.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zeit/next.js/releases/tag/v9.5.4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "next.js", "vendor": "vercel", "versions": [ { "status": "affected", "version": "\u003e= 9.5.0, \u003c9.5.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Next.js versions \u003e=9.5.0 and \u003c9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "{\"CWE-601\":\"URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T19:50:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zeit/next.js/releases/tag/v9.5.4" } ], "source": { "advisory": "GHSA-x56p-c8cg-q435", "discovery": "UNKNOWN" }, "title": "Open Redirect in Next.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15242", "STATE": "PUBLIC", "TITLE": "Open Redirect in Next.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "next.js", "version": { "version_data": [ { "version_value": "\u003e= 9.5.0, \u003c9.5.4" } ] } } ] }, "vendor_name": "vercel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Next.js versions \u003e=9.5.0 and \u003c9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-601\":\"URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435", "refsource": "CONFIRM", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435" }, { "name": "https://github.com/zeit/next.js/releases/tag/v9.5.4", "refsource": "MISC", "url": "https://github.com/zeit/next.js/releases/tag/v9.5.4" } ] }, "source": { "advisory": "GHSA-x56p-c8cg-q435", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15242", "datePublished": "2020-10-08T19:50:12", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:23.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-10-08 20:15
Modified
2024-11-21 05:05
Severity ?
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/zeit/next.js/releases/tag/v9.5.4 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/zeit/next.js/releases/tag/v9.5.4 | Release Notes, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "452214FF-D520-4B2E-86DA-55242FC8BC8D", "versionEndExcluding": "9.5.4", "versionStartIncluding": "9.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js versions \u003e=9.5.0 and \u003c9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4." }, { "lang": "es", "value": "Next.js versiones de posteriores e incluyendo a 9.5.0 y anteriores a 9.5.4, son vulnerables a un redireccionamiento abierto.\u0026#xa0;Pueden ser utilizadas rutas especialmente codificadas con el redireccionamiento de la barra diagonal para permitir que se produzca una redireccionamiento abierto hacia un sitio externo.\u0026#xa0;En general, este redireccionamiento abierto no da\u00f1a directamente a usuarios, aunque puede permitir ataques de phishing al redirigir a un dominio de atacantes desde un dominio de confianza.\u0026#xa0;El problema es corregido en la versi\u00f3n 9.5.4" } ], "id": "CVE-2020-15242", "lastModified": "2024-11-21T05:05:10.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-08T20:15:19.493", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/zeit/next.js/releases/tag/v9.5.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/zeit/next.js/releases/tag/v9.5.4" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-12 00:15
Modified
2024-11-21 06:15
Severity ?
6.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/releases/tag/v11.1.0 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/releases/tag/v11.1.0 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "C481055F-BB50-454C-80B1-FD43CFC52896", "versionEndIncluding": "10.2.0", "versionStartIncluding": "10.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3A87C693-B910-4DD7-847A-2C5421BB06B2", "versionEndIncluding": "11.0.1", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker\u0027s domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0." }, { "lang": "es", "value": "Next.js es un marco de desarrollo de sitios web de c\u00f3digo abierto que se utilizar\u00e1 con la biblioteca React.\u0026#xa0;En las versiones afectadas, rutas especialmente codificadas podr\u00edan ser usadas cuando pages/_error.js se generaron est\u00e1ticamente, lo que permite que se produzca un redireccionamiento abierto a un sitio externo.\u0026#xa0;En general, esta redirecci\u00f3n no da\u00f1a directamente a los usuarios, aunque puede permitir ataques de phishing al redirigir al dominio de un atacante desde un dominio de confianza.\u0026#xa0;Recomendamos a todos que se actualicen, independientemente de si pueden reproducir el problema o no.\u0026#xa0;El problema se corrigi\u00f3 en la versi\u00f3n 11.1.0" } ], "id": "CVE-2021-37699", "lastModified": "2024-11-21T06:15:44.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-12T00:15:06.997", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.0" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-31 19:15
Modified
2024-11-21 07:12
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn't being shared across requests.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/releases/tag/v12.2.4 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/releases/tag/v12.2.4 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:12.2.3:*:*:*:*:node.js:*:*", "matchCriteriaId": "72884DEE-123D-4FAD-A704-339D0B693F52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "996A6068-7CAE-416C-AF03-DB2A94F813D4", "versionStartIncluding": "15.0.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn\u0027t being shared across requests." }, { "lang": "es", "value": "Next.js es un framework de React que puede proporcionar bloques de construcci\u00f3n para crear aplicaciones web. Todo lo siguiente debe ser cierto para estar afectado por esta CVE: Next.js versi\u00f3n 12.2.3, Node.js versiones superiores a v15.0.0, siendo usado con la salida estricta \"unhandledRejection\" Y usando next start o un [servidor personalizado](https://nextjs.org/docs/advanced-features/custom-server). Los despliegues en Vercel ([vercel.com](https://vercel.com/)) no est\u00e1n afectados junto con entornos similares donde \"next-server\" no est\u00e1 siendo compartido entre peticiones" } ], "id": "CVE-2022-36046", "lastModified": "2024-11-21T07:12:15.827", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-31T19:15:08.737", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.2.4" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.2.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-248" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-14 18:15
Modified
2024-11-08 15:39
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "30CFD4DC-B71A-4524-A97C-C10AE01FC687", "versionEndExcluding": "14.2.7", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned." }, { "lang": "es", "value": "Next.js es un framework de trabajo de React para la Web. Las versiones 10.x, 11.x, 12.x, 13.x y 14.x anteriores a la versi\u00f3n 14.2.7 contienen una vulnerabilidad en la funci\u00f3n de optimizaci\u00f3n de im\u00e1genes que permite una posible condici\u00f3n de denegaci\u00f3n de servicio (DoS) que podr\u00eda provocar un consumo excesivo de CPU. Ni el archivo `next.config.js` que est\u00e1 configurado con `images.unoptimized` establecido en `true` o `images.loader` establecido en un valor que no sea el predeterminado ni la aplicaci\u00f3n Next.js alojada en Vercel se ven afectados. Este problema se solucion\u00f3 por completo en Next.js `14.2.7`. Como workaround, aseg\u00farese de que el archivo `next.config.js` tenga asignado `images.unoptimized`, `images.loader` o `images.loaderFile`." } ], "id": "CVE-2024-47831", "lastModified": "2024-11-08T15:39:21.823", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T18:15:05.013", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/vercel/next.js/commit/d11cbc9ff0b1aaefabcba9afe1e562e0b1fde65a" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-17 21:15
Modified
2024-11-21 06:49
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/pull/34075 | Issue Tracking, Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/releases/tag/v12.1.0 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj | Issue Tracking, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/pull/34075 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/releases/tag/v12.1.0 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj | Issue Tracking, Mitigation, Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "B4E2D630-A5B4-4D06-9FBA-A12756DD1C3E", "versionEndExcluding": "12.1.0", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default." }, { "lang": "es", "value": "Next.js es un framework de React. A partir de la versi\u00f3n 10.0.0 y versiones anteriores a 12.1.0, Next.js es vulnerable a una tergiversaci\u00f3n de informaci\u00f3n cr\u00edtica en la Interfaz de Usuario (UI). Para estar afectado, el archivo \"next.config.js\" debe tener asignada una matriz \"images.domains\" y el host de im\u00e1genes asignado en \"images.domains\" debe permitir el SVG proporcionado por el usuario. Si el archivo \"next.config.js\" presenta asignado \"images.loader\" a algo distinto de lo predeterminado, la instancia no estar\u00e1 afectada. La versi\u00f3n 12.1.0 contiene un parche para este problema. Como medida de mitigaci\u00f3n, cambie \"next.config.js\" para usar \"loader configuration\" diferente a la predeterminada" } ], "id": "CVE-2022-23646", "lastModified": "2024-11-21T06:49:00.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-17T21:15:07.883", "references": [ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/34075" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/34075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-451" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-31 00:15
Modified
2024-11-21 06:18
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/releases/tag/v11.1.1 | Patch, Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/releases/tag/v11.1.1 | Patch, Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m | Patch, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "7C8D2793-2A8B-45B5-867F-A68C934B5A91", "versionEndExcluding": "11.1.1", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Versions of Next.js between 10.0.0 and 11.0.0 contain a cross-site scripting vulnerability. In order for an instance to be affected by the vulnerability, the `next.config.js` file must have `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default or the instance is deployed on Vercel, the instance is not affected by the vulnerability. The vulnerability is patched in Next.js version 11.1.1." }, { "lang": "es", "value": "Next.js es un framework de React. Las versiones de Next.js entre 10.0.0 y 11.0.0 contienen una vulnerabilidad de tipo cross-site scripting. Para que una instancia este afectada por la vulnerabilidad, el archivo \"next.config.js\" debe tener asignado el array \"images.domains\" y el host de im\u00e1genes asignado en \"images.domains\" debe permitir el SVG proporcionado por el usuario. Si el archivo \"next.config.js\" tiene asignado \"images.loader\" a algo distinto de lo predeterminado o la instancia est\u00e1 desplegada en Vercel, la instancia no est\u00e1 afectada por la vulnerabilidad. La vulnerabilidad est\u00e1 parcheada en versi\u00f3n 11.1.1 de Next.js" } ], "id": "CVE-2021-39178", "lastModified": "2024-11-21T06:18:48.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-31T00:15:07.203", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.1" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-22 03:15
Modified
2024-11-21 08:28
Severity ?
Summary
Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13 | Product | |
cve@mitre.org | https://github.com/vercel/next.js/issues/45301 | Exploit, Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/vercel/next.js/pull/54732 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13 | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/issues/45301 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/pull/54732 | Issue Tracking, Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vercel | next.js | * | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 | |
vercel | next.js | 13.4.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "925A4215-3FFD-4A31-912D-6A017816BAD7", "versionEndExcluding": "13.4.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary0:*:*:*:node.js:*:*", "matchCriteriaId": "C3C8121C-0E9A-4603-BC95-D8587787D49B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary1:*:*:*:node.js:*:*", "matchCriteriaId": "38F01C08-9C2E-43AF-8DC2-151EB55CB359", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary10:*:*:*:node.js:*:*", "matchCriteriaId": "2E022A19-C372-4115-B6A0-DD6142AAF0FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary11:*:*:*:node.js:*:*", "matchCriteriaId": "D54FE66E-F8A0-4E25-ADC1-EB8EF28C9D8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary12:*:*:*:node.js:*:*", "matchCriteriaId": "3779A063-878E-4144-9D9C-23BB0682BE3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary2:*:*:*:node.js:*:*", "matchCriteriaId": "1AE0F73C-E100-442E-BCFE-78883EC85159", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary3:*:*:*:node.js:*:*", "matchCriteriaId": "F8598C69-A77F-489F-93D6-FD0C8147EE35", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary4:*:*:*:node.js:*:*", "matchCriteriaId": "908890B1-AE61-4254-97C8-B20348E79ACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary5:*:*:*:node.js:*:*", "matchCriteriaId": "7F8A969A-0ADC-4356-8AEC-72E5BEF4A9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary6:*:*:*:node.js:*:*", "matchCriteriaId": "D3C4F0AF-9456-4F0C-85BB-81B4F7E010E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary7:*:*:*:node.js:*:*", "matchCriteriaId": "2D8432F9-8641-4EE5-A6A5-E2E79E4F7CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary8:*:*:*:node.js:*:*", "matchCriteriaId": "E94322EE-AF5F-40BC-82F0-8CD783D59B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary9:*:*:*:node.js:*:*", "matchCriteriaId": "A5A00595-2393-41CF-8D1A-9237BC5A8CD3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN." }, { "lang": "es", "value": "Next.js anterior a 13.4.20-canary.13 carece de un encabezado de control de cach\u00e9 y, por lo tanto, a veces una CDN puede almacenar en cach\u00e9 respuestas de captaci\u00f3n previa vac\u00edas, lo que provoca una denegaci\u00f3n de servicio a todos los usuarios que solicitan la misma URL a trav\u00e9s de esa CDN." } ], "id": "CVE-2023-46298", "lastModified": "2024-11-21T08:28:15.220", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-22T03:15:07.630", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/issues/45301" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/vercel/next.js/pull/54732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/issues/45301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/vercel/next.js/pull/54732" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-10 00:15
Modified
2024-11-21 06:29
Severity ?
Summary
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "D413EFEB-941C-4FDD-BA04-32B7902BCFE7", "versionEndExcluding": "11.1.3", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "C1457A80-9287-4C15-9AF3-8CE57500C4AA", "versionEndExcluding": "12.0.5", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B44D2C4-15DF-4918-B374-3C780CC43ACC", "versionStartExcluding": "15.0.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue." }, { "lang": "es", "value": "Next.js es un framework de React. En las versiones de Next.js anteriores a 12.0.5 o 11.1.3, las direcciones URL no v\u00e1lidas o malformadas podr\u00edan conllevar a un bloqueo del servidor. Para verse afectado por este problema, el despliegue debe usar versiones de Next.js superiores a 11.1.0 y anteriores a 12.0.5, Node.js versiones posteriores a 15.0.0, y el siguiente inicio o un servidor personalizado. Los despliegues en Vercel no est\u00e1n afectados, junto con entornos similares en los que las peticiones no v\u00e1lidas son filtradas antes de llegar a Next.js. Las versiones 12.0.5 y 11.1.3 contienen parches para este problema" } ], "id": "CVE-2021-43803", "lastModified": "2024-11-21T06:29:49.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2021-12-10T00:15:11.827", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/32080" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.3" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/v12.0.5" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/32080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v11.1.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/v12.0.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-28 22:15
Modified
2024-11-21 06:45
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/vercel/next.js/pull/33503 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/releases/tag/v12.0.9 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/pull/33503 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/releases/tag/v12.0.9 | Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E5C259B7-FE1F-4699-AE75-1D5814A67FC4", "versionEndExcluding": "12.0.9", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, `next@12.0.9`, that mitigates this issue. As a workaround, one may ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until it becomes feasible to upgrade." }, { "lang": "es", "value": "Next.js es un framework de React. A partir de la versi\u00f3n 12.0.0 y versiones anteriores a 12.0.9, el c\u00f3digo vulnerable podr\u00eda permitir a un mal actor desencadenar un ataque de denegaci\u00f3n de servicio para cualquiera que use la funcionalidad i18n. Para ser afectado por esta CVE, uno debe usar next start o un servidor personalizado y el soporte i18n incorporado. Los despliegues en Vercel, junto con entornos similares en los que son filtradas las peticiones no v\u00e1lidas antes de llegar a Next.js, no est\u00e1n afectados. Ha sido publicado un parche, \"next@12.0.9\", que mitiga este problema. Como medida de mitigaci\u00f3n, puede asegurarse que \"/${locale}/_next/\" est\u00e9 bloqueado para que no llegue a la instancia de Next.js hasta que sea posible la actualizaci\u00f3n" } ], "id": "CVE-2022-21721", "lastModified": "2024-11-21T06:45:18.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-28T22:15:16.360", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/33503" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.0.9" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/pull/33503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/releases/tag/v12.0.9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }