Authorization Bypass Through User-Controlled Key Affecting jitsucom-jitsu package, versions <2.8.2-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CHAINGUARDLATEST-JITSUCOMJITSU-8103079
  • published 28 Sep 2024
  • disclosed 17 Sep 2024

How to fix?

Upgrade Chainguard jitsucom-jitsu to version 2.8.2-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jitsucom-jitsu package and not the jitsucom-jitsu package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a Cache-Control: s-maxage=1, stale-while-revalidate header which some upstream CDNs may cache as well. To be potentially affected all of the following must apply: 1. Next.js between 13.5.1 and 14.2.9, 2. Using pages router, & 3. Using non-dynamic server-side rendered routes e.g. pages/dashboard.tsx not pages/blog/[slug].tsx. This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not. There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.