Nuxt Framework Vulnerability Could Lead to Sensitive Data Exposure
CVE-2024-42352

7.5HIGH

Key Information:

Vendor
Nuxt
Status
Vendor
CVE Published:
5 August 2024

Summary

The Nuxt framework, renowned for building full-stack web applications, has a vulnerability stemming from the '/api/_nuxt_icon/[name]' endpoint in its 'nuxt/icon' module. This weakness occurs due to improper parsing of proxied request paths, allowing attackers to manipulate URL structures. By altering the scheme and host of these requests, an attacker could initiate Server-Side Request Forgery (SSRF) attacks, potentially gaining access to sensitive data. The 'new URL' constructor, which handles the parsing, is overly lenient with malformed URLs, enabling attackers to craft requests that target local servers by exploiting relative path formatting. Affected users are urged to upgrade to version 1.4.5 or later, as no effective workarounds exist.

Affected Version(s)

icon < 1.4.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.