CVE-2020-5284

Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 4.3
v2 : 5.0
v3 : 4.4
References () https://github.com/zeit/next.js/releases/tag/v9.3.2 - Release Notes () https://github.com/zeit/next.js/releases/tag/v9.3.2 - Release Notes
References () https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj - Third Party Advisory () https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj - Third Party Advisory

Information

Published : 2020-03-30 22:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5284

Mitre link : CVE-2020-5284

CVE.ORG link : CVE-2020-5284


JSON object : View

Products Affected

zeit

  • next.js
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')