GHSA-wr66-vrwm-5g5x

Suggest an improvement
Source
https://github.com/advisories/GHSA-wr66-vrwm-5g5x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-wr66-vrwm-5g5x/GHSA-wr66-vrwm-5g5x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wr66-vrwm-5g5x
Aliases
Related
Published
2022-01-28T23:09:22Z
Modified
2023-11-08T04:08:09.355091Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of Service Vulnerability in next.js
Details

Impact

Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality.

  • Affected: All of the following must be true to be affected by this CVE
    • Next.js versions above v12.0.0
    • Using next start or a custom server
    • Using the built-in i18n support
  • Not affected:
    • Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js.

Patches

A patch has been released, next@12.0.9, that mitigates this issue. We recommend all affected users upgrade as soon as possible.

Workarounds

We recommend upgrading whether you can reproduce or not although you can ensure /${locale}/_next/ is blocked from reaching the Next.js instance until you upgrade.

For more information

If you have any questions or comments about this advisory: * Open an issue in next * Email us at security@vercel.com

Database specific
{
    "nvd_published_at": "2022-01-28T22:15:00Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-400"
    ],
    "github_reviewed_at": "2022-01-28T18:52:54Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / next

Package

Affected ranges

Type
SEMVER
Events
Introduced
12.0.0
Fixed
12.0.9

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-wr66-vrwm-5g5x/GHSA-wr66-vrwm-5g5x.json"