SebastianDarie / reddit-clone

https://reddit-clone.tech
1 stars 0 forks source link

CVE-2024-47831 (Medium) detected in next-12.1.0.tgz #105

Open mend-bolt-for-github[bot] opened 1 month ago

mend-bolt-for-github[bot] commented 1 month ago

CVE-2024-47831 - Medium Severity Vulnerability

Vulnerable Library - next-12.1.0.tgz

The React Framework

Library home page: https://registry.npmjs.org/next/-/next-12.1.0.tgz

Path to dependency file: /client/package.json

Path to vulnerable library: /client/.yarn/cache/next-npm-12.1.0-7f99f50e0f-36dbafd5e6.zip

Dependency Hierarchy: - :x: **next-12.1.0.tgz** (Vulnerable Library)

Found in HEAD commit: f0e57d7bd93c43efa485ecd5be4d97e3d3b5a5c3

Found in base branch: main

Vulnerability Details

Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

Publish Date: 2024-10-14

URL: CVE-2024-47831

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m

Release Date: 2024-10-14

Fix Resolution: 14.3.0-canary.0


Step up your Open Source Security Game with Mend here