Описание
zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on 0.3.3.
Ссылки
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.3.3 (исключая)
cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*
EPSS
Процентиль: 55%
0.00321
Низкий
4 Medium
CVSS3
5.3 Medium
CVSS3
Дефекты
CWE-209
CWE-209
Связанные уязвимости
CVSS3: 5.3
github
больше 1 года назад
Generation of Error Message Containing Sensitive Information in zsa
EPSS
Процентиль: 55%
0.00321
Низкий
4 Medium
CVSS3
5.3 Medium
CVSS3
Дефекты
CWE-209
CWE-209