Next.js resolves response queue poisoning vulnerability in affected versions
CVE-2024-34350
7.5HIGH
Key Information:
- Vendor
- Vercel
- Status
- Next.js
- Vendor
- CVE Published:
- 14 May 2024
Badges
π° News Worthy
Summary
Two new vulnerabilities have been discovered in Next.js, related to response queue poisoning and SSRF on certain Next.js versions. The response queue poisoning vulnerability can manipulate a front-end server and map wrong back-end responses, while the SSRF vulnerability occurs when the server is called by a redirect and takes the host header from the client, potentially leading to an SSRF vulnerability. These vulnerabilities have been patched in Next.js versions 13.5.1 and 14.x to prevent exploitation. No known ransomware cases related to the vulnerabilities have been reported.
Affected Version(s)
next.js >= 13.4.0, < 13.5.1
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
- π°
First article discovered by CybersecurityNews
Vulnerability Reserved