Next.js — открытый JavaScript фреймворк, созданный поверх React.js для создания веб-приложений
Релизный цикл, информация об уязвимостях
График релизов
Количество 84
BDU:2024-08508
Уязвимость программной платформы создания веб-приложений Next.js, связанная с неконтролируемой рекурсией. позволяющая нарушителю вызывать отказ в обслуживании
CVE-2024-46982
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.
GHSA-gp8f-8m3g-qvj9
Next.js Cache Poisoning
BDU:2024-07780
Уязвимость программной платформы создания веб-приложений Next.js, связанная с обходом авторизации посредством использования ключа, контролируемого пользователем, позволяющая нарушителю раскрыть защищаемую информацию
CVE-2024-39693
Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.
GHSA-fq54-2j52-jc42
Next.js Denial of Service (DoS) condition
CVE-2024-34351
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
CVE-2024-34350
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.
GHSA-fr5h-rqp8-mj6g
Next.js Server-Side Request Forgery in Server Actions
GHSA-77r5-gw3j-2mpf
Next.js Vulnerable to HTTP Request Smuggling
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
BDU:2024-08508 Уязвимость программной платформы создания веб-приложений Next.js, связанная с неконтролируемой рекурсией. позволяющая нарушителю вызывать отказ в обслуживании | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-46982 Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version. | CVSS3: 7.5 | 50% Средний | больше 1 года назад | |
GHSA-gp8f-8m3g-qvj9 Next.js Cache Poisoning | CVSS3: 7.5 | 50% Средний | больше 1 года назад | |
BDU:2024-07780 Уязвимость программной платформы создания веб-приложений Next.js, связанная с обходом авторизации посредством использования ключа, контролируемого пользователем, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 7.5 | 50% Средний | больше 1 года назад | |
CVE-2024-39693 Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
GHSA-fq54-2j52-jc42 Next.js Denial of Service (DoS) condition | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-34351 Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`. | CVSS3: 7.5 | 92% Критический | больше 1 года назад | |
CVE-2024-34350 Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
GHSA-fr5h-rqp8-mj6g Next.js Server-Side Request Forgery in Server Actions | CVSS3: 7.5 | 92% Критический | больше 1 года назад | |
GHSA-77r5-gw3j-2mpf Next.js Vulnerable to HTTP Request Smuggling | CVSS3: 7.5 | 1% Низкий | больше 1 года назад |
Уязвимостей на страницу