Description
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fq77-7p7r-83rj | Directory Traversal in Next.js |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T08:22:09.087Z
Reserved: 2020-01-02T00:00:00.000Z
Link: CVE-2020-5284
No data.
Status : Modified
Published: 2020-03-30T22:15:15.400
Modified: 2024-11-21T05:33:50.007
Link: CVE-2020-5284
No data.
OpenCVE Enrichment
No data.
Github GHSA