Описание
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in i18n support. Deployments on Vercel, along with similar environments where invalid requests are filtered before reaching Next.js, are not affected. A patch has been released, next@12.0.9
, that mitigates this issue. As a workaround, one may ensure /${locale}/_next/
is blocked from reaching the Next.js instance until it becomes feasible to upgrade.
Ссылки
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 12.0.0 (включая) до 12.0.9 (исключая)
cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 80%
0.01472
Низкий
5.9 Medium
CVSS3
7.5 High
CVSS3
4.3 Medium
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
EPSS
Процентиль: 80%
0.01472
Низкий
5.9 Medium
CVSS3
7.5 High
CVSS3
4.3 Medium
CVSS2
Дефекты
NVD-CWE-noinfo