Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wjmj-h3xc-hxp8

Опубликовано: 06 июн. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

Generation of Error Message Containing Sensitive Information in zsa

Impact

All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure.

Patches

Yes, this has been pathed on 0.3.3

Workarounds

No way to fix other than the patch.

Пакеты

Наименование

zsa

npm
Затронутые версииВерсия исправления

< 0.3.3

0.3.3

EPSS

Процентиль: 55%
0.00321
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-209

Связанные уязвимости

CVSS3: 4
nvd
больше 1 года назад

zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.

EPSS

Процентиль: 55%
0.00321
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-209