Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34351— Next.js Server-Side Request Forgery in Server Actions

CVSS 7.5 · High EPSS 92.75% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-34351

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Next.js Server-Side Request Forgery in Server Actions
Source: NVD (National Vulnerability Database)
Vulnerability Description
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
ZEIT Next.js代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ZEIT Next.js是ZEIT公司的一款基于Vue.js、Node.js、Webpack和Babel.js的开源Web应用框架。 ZEIT Next.js 13.4版本至14.1.1之前版本存在代码问题漏洞,该漏洞源于存在服务器端请求伪造 (SSRF) 漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
vercelnext.js >= 13.4.0, < 14.1.1 -

II. Public POCs for CVE-2024-34351

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Voorivex/CVE-2024-34351POC Details
2Nonehttps://github.com/alas1n/eslint-nextjs-cve-2024-34351-detectorPOC Details
3PoC for a full exploitation of NextJS SSRF (CVE-2024-34351) https://github.com/God4n/nextjs-CVE-2024-34351-_exploitPOC Details
4Nonehttps://github.com/avergnaud/Next.js_exploit_CVE-2024-34351POC Details
5Next.Js, inferior to version 14.1.1, have its image optimization built-in component prone to SSRF. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-34351.yamlPOC Details
6Nonehttps://github.com/granita112/cve-2024-34351-testerPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-34351

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-34351

No comments yet


Leave a comment