Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-77r5-gw3j-2mpf

Опубликовано: 09 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Next.js Vulnerable to HTTP Request Smuggling

Impact

Inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions.

For a request to be exploitable, the affected route also had to be making use of the rewrites feature in Next.js.

Patches

The vulnerability is resolved in Next.js 13.5.1 and newer. This includes Next.js 14.x.

Workarounds

There are no official workarounds for this vulnerability. We recommend that you upgrade to a safe version.

References

https://portswigger.net/web-security/request-smuggling/advanced/response-queue-poisoning

Пакеты

Наименование

next

npm
Затронутые версииВерсия исправления

>= 13.4.0, < 13.5.1

13.5.1

EPSS

Процентиль: 70%
0.00635
Низкий

7.5 High

CVSS3

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.

EPSS

Процентиль: 70%
0.00635
Низкий

7.5 High

CVSS3

Дефекты

CWE-444