Skip to content

Next JS Config - File Disclosure

ID: next-js-config-file

Severity: low

Author: DhiyaneshDk

Tags: exposure,files,nextjs

Next JS Config file is exposed.

id: next-js-config-file
info:
name: Next JS Config - File Disclosure
author: DhiyaneshDk
severity: low
description: |
Next JS Config file is exposed.
reference:
- https://nextjs.org/docs/app/api-reference/config/next-config-js
metadata:
verified: true
max-request: 1
shodan-query: html:"next.config.js"
tags: exposure,files,nextjs
http:
- method: GET
path:
- '{{BaseURL}}/next.config.js'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'nextConfig'
- 'module.exports ='
condition: and
case-insensitive: true
- type: status
status:
- 200
# digest: 4a0a004730450220165e4db886798a7b97b5087dbdc69c41bbf03a170b129c025484db1e363ccf42022100c846933ce52d7f8c0d62b284ee5e28da0aa89d97415a3c8979342e5c71050fcf:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/next-js-config-file.yaml"

View on Github