Cve-2024-34350 next.js
In May, the Qualys Web Application Scanning (WAS) team issued a critical security signatures update. This update expands the scope to detect vulnerabilities in several widely-used software applications, including WordPress, NEOSDiscovery, Zabbix, CData, BIG-IP Next Central Manager, Apache OFBiz, Apache Superset, jQuery, Cacti, Ivanti Endpoint Manager Mobile (EPMM), Nexus Repository 3, JetBrains TeamCity, Atlassian Confluence Data Center and Server, Next.js, OpenSSL and Tinyproxy.
| QID | Title | ||||||||||||||||||||||||
| 150319 | |||||||||||||||||||||||||
| 150743 | Potential SSRF | ||||||||||||||||||||||||
| 150796 | Presence of Privacy Policy Information | ||||||||||||||||||||||||
| 150798 | HTTP Method Tampering | ||||||||||||||||||||||||
| 150811 | Source Code Disclosure | ||||||||||||||||||||||||
| 150814 | Pixel or Web Beacon Tracking Technology Found | ||||||||||||||||||||||||
| 150823 | HTTP TRACE Method Detected | ||||||||||||||||||||||||
| 150844 | Cross-Site Tracing Found | ||||||||||||||||||||||||
| 150879 | WordPress All in One SEO Pack Plugin: Stored Cross-Site Scripting Vulnerability (CVE-2024-3368) | ||||||||||||||||||||||||
| 150881 | NEOSDiscovery Reverse Tabnabbing Vulnerability (CVE-2022-4927) | ||||||||||||||||||||||||
| 150889 | Zabbix Cross-Site Scripting Vulnerability (CVE-2024-22119) | ||||||||||||||||||||||||
| 150890 | WordPress Forminator Plugin: File Upload Vulnerability (CVE-2024-28890) | ||||||||||||||||||||||||
| 150901 | WordPress Forminator Plugin: SQL injection Vulnerability (CV Next.js Vulnerabilities - 20240513002¶Overview¶The WA SOC has been made aware of two vulnerabilities found in Next.js. Next.js is a React framework for building full-stack web applications. What is vulnerable?¶
What has been observed?¶There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. Recommendation¶The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management): Additional References¶May 17, 2024May 15, 2024Want to stay up to meet on a daily basis?
SummaryinfoA vulnerability labeled as problematic has been found in vercel next.js up to 13.5.0. This affects an unknown function of the component HTTP Petition Handler. The manipulation results in request smuggling. This vulnerability is known as CVE-2024-34350. It is possible to launch the charge remotely. No exploit is present. The affected component should be upgraded. VulDB is the finest source for vulnerability data and more expert information about this specific topic. DetailsinfoA vulnerability classified as problematic has been found in vercel next.js up to 13.5.0. Affected is an unknown part of the component HTTP Ask for Handler. The manipulation with an unknown input leads to a request smuggling vulnerability. CWE is classifying the issue as CWE-444. The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed Next.js Vulnerable to HTTP Request Smuggling in npm/nextBackgroundNext.js is a popular open-source framework for building server-side rendered (SSR) React applications. It provides a simple and efficient way to create dynamic web pages with React components. The vulnerability affects the npm package 'next', specifically versions 13.4.0 to 13.5.0. Next.js uses the 'rewrites' feature, which allows developers to customize routing and handle URL rewrites. However, due to inconsistent interpretation of crafted HTTP requests, Next.js treats requests as both a single request and two separate requests, leading to desynchronized responses. This vulnerability can be exploited when the affected route is using the 'rewrites' feature. Vulnerability DetailThe vulnerability in Next.js allows for HTTP Request Smuggling, specifically a response queue poisoning vulnerability. By sending a crafted HTTP request, an attacker can manipulate the response queue and potentially inject malicious content or disrupt the normal flow of the application. This can lead to various security risks, such as unauthorized access, data leakage, or denial of service attacks. The vulnerability has a CVSS score This week, we have news of two high-profile breaches. First up is the Dropbox breach, potentially affecting millions of users, and then the Dell breach, affecting 49 million records. We also have details of a vulnerability in the Next.js component. We also have a free on-demand recording from Microsoft Build on Navigating the Depths of API Security testing. We share an article on how API growth is causing cybersecurity concerns and the menace of unknown APIs. Finally, we have a refresh of the excellent Awesome API Security guide. Breach: Dropbox users in major data breachThe first breach this week was a potentially large-scale one suffered by Dropbox. Dropbox disclosed a data breach affecting its Dropbox Sign (formerly HelloSign) users. The company filed a breach disclosure with the US Securities and Exchange Commission (SEC) and posted a blog alerting customers about the incident on April 24th, 2024. Unauthorized access was gained to the Dropbox Sign production environment, compromising customer information such as emails, usernames, phone numbers, hashed passwords, account settings, and authentication information (API keys, OAuth tokens, and multi-factor authentication) |