Next.js < 14.1.1 Server Actions Server-Side Request Forgery

high Web App Scanning Plugin ID 114431

Synopsis

Next.js < 14.1.1 Server Actions Server-Side Request Forgery

Description

Next.js versions from 13.4 (included) before 14.1.1 suffer from a Server-Side Request Forgery (SSRF) when using Server Actions performing a redirection to a relative path starting with '/'. By leveraging this vulnerability, a remote and unauthenticated attacker can forge an arbitrary 'Host' header and make the vulnerable instance perform arbitrary HTTP requests.

Solution

Upgrade to Next.js version 14.1.1 or latest.

See Also

https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g

https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps

Plugin Details

Severity: High

ID: 114431

Type: remote

Published: 9/17/2024

Updated: 9/17/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2024-34351

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2024-34351

Vulnerability Information

CPE: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2024-34351