Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-56332

Опубликовано: 03 янв. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. This vulnerability can also be used as a Denial of Wallet (DoW) attack when deployed in providers billing by response times. (Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.). Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. If the host has no other mitigations to those then this vulnerability is novel. This vulnerability affects only Next.js deployments using Server Actions. The issue was resolved in Next.js 13.5.8, 14.2.21, and 15.1.2. We recommend that users upgrade to a safe version. There are no official workarounds.

A flaw was found in Next.js package. A denial of service (DoS) attack allows attackers to construct requests that leave requests to Server Actions hanging until the hosting provider cancels the function execution. The Next.js server is idle during that time and only keeps the connection open. The CPU and memory footprint are low during that time. This is the same issue as if the incoming HTTP request has an invalid Content-Length header or never closes. This vulnerability is novel if the host has no other mitigations for those.

Отчет

This vulnerability affects only Next.js deployments using Server Actions. Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7firefoxOut of support scope
Red Hat Enterprise Linux 8firefoxOut of support scope
Red Hat Enterprise Linux 8thunderbirdOut of support scope
Red Hat Enterprise Linux 9dotnet7.0Will not fix
Red Hat Enterprise Linux 9firefoxWill not fix
Red Hat Enterprise Linux 9firefox:flatpak/firefoxWill not fix
Red Hat Enterprise Linux 9thunderbirdWill not fix
Red Hat Enterprise Linux 9thunderbird:flatpak/thunderbirdWill not fix
streams for Apache Kafkacom.github.streamshub-consoleAffected
Red Hat Trusted Artifact Signer 1.1registry.redhat.io/rhtas/rekor-search-ui-rhel9FixedRHSA-2025:380710.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=2335479next.js: Next.js Vulnerable to Denial of Service (DoS) with Server Actions

EPSS

Процентиль: 52%
0.00289
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
6 месяцев назад

Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. This vulnerability can also be used as a Denial of Wallet (DoW) attack when deployed in providers billing by response times. (Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time.). Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mi

CVSS3: 5.3
github
6 месяцев назад

Next.js Allows a Denial of Service (DoS) with Server Actions

CVSS3: 5.3
fstec
6 месяцев назад

Уязвимость программной платформы создания веб-приложений Next.js, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 52%
0.00289
Низкий

5.3 Medium

CVSS3