CVE-2024-34351
Description
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
CWE
- CWE-918 — CWE-918: Server-Side Request Forgery (SSRF)
Affected
- vercel / next.js — v=>= 13.4.0, < 14.1.1 [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References
- https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g x_refsource_CONFIRM
- https://github.com/vercel/next.js/pull/62561 x_refsource_MISC
- https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085 x_refsource_MISC
Source
cvelistV5-main/cves/2024/34xxx/CVE-2024-34351.json