Next.js resolves response queue poisoning vulnerability in affected versions
CVE-2024-34350

7.5HIGH

Key Information:

Vendor
Vercel
Status
Next.js
Vendor
CVE Published:
14 May 2024

Badges

πŸ“° News Worthy

Summary

Two new vulnerabilities have been discovered in Next.js, related to response queue poisoning and SSRF on certain Next.js versions. The response queue poisoning vulnerability can manipulate a front-end server and map wrong back-end responses, while the SSRF vulnerability occurs when the server is called by a redirect and takes the host header from the client, potentially leading to an SSRF vulnerability. These vulnerabilities have been patched in Next.js versions 13.5.1 and 14.x to prevent exploitation. No known ransomware cases related to the vulnerabilities have been reported.

Affected Version(s)

next.js >= 13.4.0, < 13.5.1

News Articles

Critical Next.js Vulnerability Let Attackers Compromise Server Operations

Two new vulnerabilities have been discovered in Next.js which were related to response queue poisoning and SSRF on certain Next.js versions.

8 months ago

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • πŸ“°

    First article discovered by CybersecurityNews

  • Vulnerability Reserved

.