PT-2024-25808 · Next.Js · Next.Js
Adam Kues
+1
·
Published
2024-05-09
·
Updated
2026-03-27
·
CVE-2024-34351
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Next.js versions prior to 14.1.1
Description
A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the
Host header is modified, and certain conditions are met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a /. It is estimated that over 3.1 million services are potentially affected.Recommendations
For Next.js versions prior to 14.1.1, upgrade to Next.js version 14.1.1 to resolve the issue. As a temporary workaround, consider restricting access to Server Actions or disabling the use of relative paths starting with
/ in Server Actions until a patch is applied. Additionally, be cautious when modifying the Host header to prevent potential SSRF attacks.Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Next.Js