zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Idopesok
Idopesok zsa |
|
CPEs | cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:* | |
Vendors & Products |
Idopesok
Idopesok zsa |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-06-07T14:19:16.754Z
Updated: 2024-08-02T03:50:55.218Z
Reserved: 2024-06-03T17:29:38.329Z
Link: CVE-2024-37162
Vulnrichment
Updated: 2024-08-02T03:50:55.218Z
NVD
Status : Analyzed
Published: 2024-06-07T15:15:50.617
Modified: 2024-10-31T19:43:26.800
Link: CVE-2024-37162
Redhat
No data.