Description
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
Published: 2020-03-30
Score: 4.4 Medium
EPSS: 82.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fq77-7p7r-83rj Directory Traversal in Next.js
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T08:22:09.087Z

Reserved: 2020-01-02T00:00:00.000Z

Link: CVE-2020-5284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-30T22:15:15.400

Modified: 2024-11-21T05:33:50.007

Link: CVE-2020-5284

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses