Server-Side Request Forgery (SSRF) Affecting next package, versions >=13.4.0 <14.1.1
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.1% (43rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-NEXT-6828457
- published 10 May 2024
- disclosed 9 May 2024
- credit Adam Kues, Shubham Shah
Introduced: 9 May 2024
CVE-2024-34351 Open this link in a new tabHow to fix?
Upgrade next
to version 14.1.1 or higher.
Overview
next is a react framework.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the Host
header manipulation. An attacker can make unauthorized requests appearing to originate from the server.
Notes:
Prerequisites:
Next.js (<14.1.1) is running in a self-hosted manner.
The Next.js application makes use of Server Actions.
The Server Action performs a redirect to a relative path which starts with a
/
.
References
CVSS Scores
version 3.1