Acceptance of Extraneous Untrusted Data With Trusted Data Affecting next package, versions >=13.5.1 <13.5.7>=14.0.0 <14.2.10


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-NEXT-8025427
  • published18 Sept 2024
  • disclosed17 Sept 2024
  • creditHenry Chen, Allam Rachid

Introduced: 17 Sep 2024

CVE-2024-46982  (opens in a new tab)
CWE-349  (opens in a new tab)

How to fix?

Upgrade next to version 13.5.7, 14.2.10 or higher.

Overview

next is a react framework.

Affected versions of this package are vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data by sending a crafted HTTP request, which allows the attacker to poison the cache of a non-dynamic server-side rendered route in the page router. This will coerce the request to cache a route that is meant to not be cached and send a Cache-Control: s-maxage=1, a stale-while-revalidate header, which some upstream CDNs may cache as well.

Note:

This is only vulnerable if:

  1. The user is using pages router

  2. The user is using non-dynamic server-side rendered routes.

Users are not affected if:

  1. They are using the app router

  2. The deployments are on Vercel

CVSS Scores

version 4.0
version 3.1