zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
References
Configurations
History
31 Oct 2024, 19:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Idopesok zsa
Idopesok |
|
Summary |
|
|
References | () https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a - Patch | |
References | () https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8 - Vendor Advisory | |
CPE | cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:* |
07 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-07 15:15
Updated : 2024-10-31 19:43
NVD link : CVE-2024-37162
Mitre link : CVE-2024-37162
CVE.ORG link : CVE-2024-37162
JSON object : View
Products Affected
idopesok
- zsa
CWE
CWE-209
Generation of Error Message Containing Sensitive Information