Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-51479

Опубликовано: 17 дек. 2024
Источник: redhat
CVSS3: 7.5
EPSS Высокий

Описание

Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] https://example.com/ * [Affected] https://example.com/foo * [Not affected] https://example.com/foo/bar. This issue is patched in Next.js 14.2.15 and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.

A flaw was found in the Next.js framework. An incorrectly sanitized query parameter can cause an invalid routing condition, resulting in the wrong route being served to users and allowing authorization bypass when an application is performing path-based middleware authorization.

Отчет

This issue affects self-hosted applications with a missing i18n configuration performing path-based middleware authorization. Applications hosted on Vercel are not vulnerable to this vulnerability. Additionally, only pages under the root directory of the application are vulnerable to this issue, for example: https://example.com/: not vulnerable https://example.com/foo: vulnerable https://example.com/foo/bar: not vulnerable

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7firefoxNot affected
Red Hat Enterprise Linux 8firefoxNot affected
Red Hat Enterprise Linux 8thunderbirdNot affected
Red Hat Enterprise Linux 9dotnet7.0Not affected
Red Hat Enterprise Linux 9firefoxNot affected
Red Hat Enterprise Linux 9firefox:flatpak/firefoxNot affected
Red Hat Enterprise Linux 9thunderbirdNot affected
Red Hat Enterprise Linux 9thunderbird:flatpak/thunderbirdNot affected
streams for Apache Kafkacom.github.streamshub-consoleAffected
Red Hat Trusted Artifact Signer 1.1registry.redhat.io/rhtas/rekor-search-ui-rhel9FixedRHSA-2025:380710.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2332884next.js: next: authorization bypass in Next.js

EPSS

Процентиль: 99%
0.76762
Высокий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
8 месяцев назад

Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.

CVSS3: 7.5
github
8 месяцев назад

Next.js authorization bypass vulnerability

CVSS3: 7.5
fstec
9 месяцев назад

Уязвимость программной платформы создания веб-приложений Next.js, связанная с недостатками процедуры авторизации, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 99%
0.76762
Высокий

7.5 High

CVSS3