GHSA-2rmr-xw8m-22q9

Suggest an improvement
Source
https://github.com/advisories/GHSA-2rmr-xw8m-22q9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-2rmr-xw8m-22q9/GHSA-2rmr-xw8m-22q9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2rmr-xw8m-22q9
Aliases
Related
Published
2023-11-09T22:03:44Z
Modified
2023-11-17T21:55:44Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint
Details

Impact

An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This could open door for other attack vectors: * client-side vulnerabilities: XSS/CSRF in the context of the trusted domain; * interaction with internal network; * read cloud metadata endpoints (AWS, Azure, Google Cloud, etc.); * local/remote port scan.

This issue only affects users who have Next.js SDK tunneling feature enabled.

Patches

The problem has been fixed in sentry/nextjs@7.77.0

Workarounds

Disable tunneling by removing the tunnelRoute option from Sentry Next.js SDK config — next.config.js or next.config.mjs.

References

Credits

Database specific
{
    "severity": "MODERATE",
    "github_reviewed_at": "2023-11-09T22:03:44Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2023-11-10T01:15:07Z"
}
References

Affected packages

npm / @sentry/nextjs

Package

Name
@sentry/nextjs
View open source insights on deps.dev
Purl
pkg:npm/%40sentry/nextjs

Affected ranges

Type
SEMVER
Events
Introduced
7.26.0
Fixed
7.77.0