Nuxt Framework Vulnerability Could Lead to Sensitive Data Exposure
CVE-2024-42352
Summary
The Nuxt framework, renowned for building full-stack web applications, has a vulnerability stemming from the '/api/_nuxt_icon/[name]' endpoint in its 'nuxt/icon' module. This weakness occurs due to improper parsing of proxied request paths, allowing attackers to manipulate URL structures. By altering the scheme and host of these requests, an attacker could initiate Server-Side Request Forgery (SSRF) attacks, potentially gaining access to sensitive data. The 'new URL' constructor, which handles the parsing, is overly lenient with malformed URLs, enabling attackers to craft requests that target local servers by exploiting relative path formatting. Affected users are urged to upgrade to version 1.4.5 or later, as no effective workarounds exist.
Affected Version(s)
icon < 1.4.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved