Server-Side Request Forgery (SSRF) Affecting next package, versions >=13.4.0 <14.1.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-NEXT-6828457
  • published10 May 2024
  • disclosed9 May 2024
  • creditAdam Kues, Shubham Shah

Introduced: 9 May 2024

CVE-2024-34351  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade next to version 14.1.1 or higher.

Overview

next is a react framework.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the Host header manipulation. An attacker can make unauthorized requests appearing to originate from the server.

Notes:

Prerequisites:

  1. Next.js (<14.1.1) is running in a self-hosted manner.

  2. The Next.js application makes use of Server Actions.

  3. The Server Action performs a redirect to a relative path which starts with a /.

CVSS Scores

version 3.1