zettatips / ex10-website

ex10 Volleyball Club website
https://ex10.vercel.app/
MIT License
0 stars 0 forks source link

CVE-2024-47831 (Medium) detected in next-10.0.3.tgz #62

Open mend-bolt-for-github[bot] opened 1 month ago

mend-bolt-for-github[bot] commented 1 month ago

CVE-2024-47831 - Medium Severity Vulnerability

Vulnerable Library - next-10.0.3.tgz

The React Framework

Library home page: https://registry.npmjs.org/next/-/next-10.0.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/next/package.json

Dependency Hierarchy: - :x: **next-10.0.3.tgz** (Vulnerable Library)

Found in HEAD commit: ccd1fa96ac3b5406cb8231dc95b0496a05a23586

Found in base branch: master

Vulnerability Details

Next.js is a React Framework for the Web. Cersions on the 10.x, 11.x, 12.x, 13.x, and 14.x branches before version 14.2.7 contain a vulnerability in the image optimization feature which allows for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption. Neither the `next.config.js` file that is configured with `images.unoptimized` set to `true` or `images.loader` set to a non-default value nor the Next.js application that is hosted on Vercel are affected. This issue was fully patched in Next.js `14.2.7`. As a workaround, ensure that the `next.config.js` file has either `images.unoptimized`, `images.loader` or `images.loaderFile` assigned.

Publish Date: 2024-10-14

URL: CVE-2024-47831

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/vercel/next.js/security/advisories/GHSA-g77x-44xx-532m

Release Date: 2024-10-14

Fix Resolution: 14.3.0-canary.0


Step up your Open Source Security Game with Mend here