Enhancement: cves/2017/CVE-2017-16877.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-06-09 12:15:53 -04:00
parent 60986f401a
commit c004c0ab61
1 changed files with 5 additions and 2 deletions

View File

@ -1,13 +1,14 @@
id: CVE-2017-16877 id: CVE-2017-16877
info: info:
name: Nextjs v2.4.1 LFI name: Nextjs <2.4.1 - Local File Inclusion
author: pikpikcu author: pikpikcu
severity: high severity: high
description: ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information. description: ZEIT Next.js before 2.4.1 is susceptible to local file inclusion via the /_next and /static request namespace, allowing attackers to obtain sensitive information.
reference: reference:
- https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9 - https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9
- https://github.com/zeit/next.js/releases/tag/2.4.1 - https://github.com/zeit/next.js/releases/tag/2.4.1
- https://nvd.nist.gov/vuln/detail/CVE-2017-16877
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
@ -32,3 +33,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/06/09