Логотип exploitDog
product: "next.js"
Консоль
Логотип exploitDog

exploitDog

product: "next.js"
Next.js

Next.jsоткрытый JavaScript фреймворк, созданный поверх React.js для создания веб-приложений

Релизный цикл, информация об уязвимостях

Продукт: Next.js
Вендор: vercel

График релизов

15162024202520262027

Недавние уязвимости Next.js

Количество 84

fstec логотип

BDU:2024-08508

больше 1 года назад

Уязвимость программной платформы создания веб-приложений Next.js, связанная с неконтролируемой рекурсией. позволяющая нарушителю вызывать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-46982

больше 1 года назад

Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-gp8f-8m3g-qvj9

больше 1 года назад

Next.js Cache Poisoning

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2024-07780

больше 1 года назад

Уязвимость программной платформы создания веб-приложений Next.js, связанная с обходом авторизации посредством использования ключа, контролируемого пользователем, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2024-39693

больше 1 года назад

Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-fq54-2j52-jc42

больше 1 года назад

Next.js Denial of Service (DoS) condition

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-34351

больше 1 года назад

Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2024-34350

больше 1 года назад

Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-fr5h-rqp8-mj6g

больше 1 года назад

Next.js Server-Side Request Forgery in Server Actions

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-77r5-gw3j-2mpf

больше 1 года назад

Next.js Vulnerable to HTTP Request Smuggling

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2024-08508

Уязвимость программной платформы создания веб-приложений Next.js, связанная с неконтролируемой рекурсией. позволяющая нарушителю вызывать отказ в обслуживании

CVSS3: 5.9
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-46982

Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a `Cache-Control: s-maxage=1, stale-while-revalidate` header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. `pages/dashboard.tsx` not `pages/blog/[slug].tsx`. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.

CVSS3: 7.5
50%
Средний
больше 1 года назад
github логотип
GHSA-gp8f-8m3g-qvj9

Next.js Cache Poisoning

CVSS3: 7.5
50%
Средний
больше 1 года назад
fstec логотип
BDU:2024-07780

Уязвимость программной платформы создания веб-приложений Next.js, связанная с обходом авторизации посредством использования ключа, контролируемого пользователем, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
50%
Средний
больше 1 года назад
nvd логотип
CVE-2024-39693

Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-fq54-2j52-jc42

Next.js Denial of Service (DoS) condition

CVSS3: 7.5
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-34351

Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.

CVSS3: 7.5
92%
Критический
больше 1 года назад
nvd логотип
CVE-2024-34350

Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-fr5h-rqp8-mj6g

Next.js Server-Side Request Forgery in Server Actions

CVSS3: 7.5
92%
Критический
больше 1 года назад
github логотип
GHSA-77r5-gw3j-2mpf

Next.js Vulnerable to HTTP Request Smuggling

CVSS3: 7.5
1%
Низкий
больше 1 года назад

Уязвимостей на страницу


Поделиться