@sentry/nextjs@7.73.0 vulnerabilities

Official Sentry SDK for Next.js

Direct Vulnerabilities

Known vulnerabilities in the @sentry/nextjs package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Server-Side Request Forgery (SSRF)

@sentry/nextjs is an Official Sentry SDK for Next.js

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the tunnelRoute option. A malicious actor can forge requests and responses from the application.

When using the tunnelRoute option, the Sentry Next.js SDK creates a Next.js rewrite that uses an unsanitized URL parameter to create the rewrite target. The target is intended to always point ingestion domain oXXX.ingest.sentry.io, however the unsanitized URL parameter could be used to escape this URL and point the rewrite to an arbitrary domain. The only limitation is that the rewrite target will always use the https protocol.

Note:

This vulnerability does not affect any of the other Sentry SDK’s. This issue only affects users who have Next.js SDK tunneling feature enabled.

How to fix Server-Side Request Forgery (SSRF)?

Upgrade @sentry/nextjs to version 7.77.0 or higher.

>=7.26.0 <7.77.0