@sentry/nextjs@7.39.0 vulnerabilities

Official Sentry SDK for Next.js

  • latest version

    8.48.0

  • latest non vulnerable version

  • first published

    3 years ago

  • latest version published

    2 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @sentry/nextjs package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Server-Side Request Forgery (SSRF)

    @sentry/nextjs is an Official Sentry SDK for Next.js

    Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the tunnelRoute option. A malicious actor can forge requests and responses from the application.

    When using the tunnelRoute option, the Sentry Next.js SDK creates a Next.js rewrite that uses an unsanitized URL parameter to create the rewrite target. The target is intended to always point ingestion domain oXXX.ingest.sentry.io, however the unsanitized URL parameter could be used to escape this URL and point the rewrite to an arbitrary domain. The only limitation is that the rewrite target will always use the https protocol.

    Note:

    This vulnerability does not affect any of the other Sentry SDK’s. This issue only affects users who have Next.js SDK tunneling feature enabled.

    How to fix Server-Side Request Forgery (SSRF)?

    Upgrade @sentry/nextjs to version 7.77.0 or higher.

    >=7.26.0 <7.77.0