19.2.4
5 years ago
1 months ago
Known vulnerabilities in the react-server-dom-webpack package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
react-server-dom-webpack is a React Server Components bindings for DOM using Webpack. This is intended to be integrated into meta-frameworks. It is not intended to be imported directly. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the decoding reply functions of React Flight protocol. An attacker can cause server crashes, out-of-memory exceptions, or excessive CPU usage by sending specially crafted HTTP requests to Server Function endpoints. Notes:
How to fix Allocation of Resources Without Limits or Throttling? Upgrade | >=19.0.0-canary-2b036d3f1-20240327 <19.0.4>=19.1.0-canary-130095f7-20241212 <19.1.5>=19.2.0-canary-63779030-20250328 <19.2.4 |
react-server-dom-webpack is a React Server Components bindings for DOM using Webpack. This is intended to be integrated into meta-frameworks. It is not intended to be imported directly. Affected versions of this package are vulnerable to Arbitrary Code Injection via unsafe deserialization of RSC payloads from HTTP requests to Server Function endpoints. An unauthenticated attacker can execute arbitrary code on the server by sending malicious HTTP requests. Note: Serverless applications and applications that do not use a framework, bundler, or bundler plugin that supports React Server Components are not affected by this vulnerability. How to fix Arbitrary Code Injection? Upgrade | >=19.0.0-rc.0 <19.0.1>=19.1.0 <19.1.2>=19.2.0 <19.2.1 |