HTTP Request Smuggling Affecting next package, versions >=13.4.0 <13.5.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NEXT-6828456
  • published10 May 2024
  • disclosed9 May 2024
  • creditEli Foster

Introduced: 9 May 2024

CVE-2024-34350  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade next to version 13.5.1 or higher.

Overview

next is a react framework.

Affected versions of this package are vulnerable to HTTP Request Smuggling due to the inconsistent interpretation of crafted HTTP requests. An attacker can desynchronize server responses and poison the response queue by sending specially crafted HTTP requests that exploit the rewrites feature.

Note: This patch includes Next.js 14.x.

References

CVSS Scores

version 3.1