Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fq77-7p7r-83rj

Опубликовано: 30 мар. 2020
Источник: github
Github: Прошло ревью
CVSS3: 4.4

Описание

Directory Traversal in Next.js

Impact

  • Not affected: Deployments on ZEIT Now v2 (https://zeit.co) are not affected
  • Not affected: Deployments using the serverless target
  • Not affected: Deployments using next export
  • Affected: Users of Next.js below 9.3.2

We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.

Patches

https://github.com/zeit/next.js/releases/tag/v9.3.2

References

https://github.com/zeit/next.js/releases/tag/v9.3.2

Пакеты

Наименование

next

npm
Затронутые версииВерсия исправления

< 9.3.2

9.3.2

EPSS

Процентиль: 99%
0.77318
Высокий

4.4 Medium

CVSS3

Дефекты

CWE-23

Связанные уязвимости

CVSS3: 4.4
nvd
около 5 лет назад

Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.

EPSS

Процентиль: 99%
0.77318
Высокий

4.4 Medium

CVSS3

Дефекты

CWE-23