Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
References
Link | Resource |
---|---|
https://github.com/zeit/next.js/releases/tag/v9.3.2 | Release Notes |
https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj | Third Party Advisory |
https://github.com/zeit/next.js/releases/tag/v9.3.2 | Release Notes |
https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.4 |
References | () https://github.com/zeit/next.js/releases/tag/v9.3.2 - Release Notes | |
References | () https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj - Third Party Advisory |
Information
Published : 2020-03-30 22:15
Updated : 2024-11-21 05:33
NVD link : CVE-2020-5284
Mitre link : CVE-2020-5284
CVE.ORG link : CVE-2020-5284
JSON object : View
Products Affected
zeit
- next.js