zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
History

Thu, 31 Oct 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Idopesok
Idopesok zsa
CPEs cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*
Vendors & Products Idopesok
Idopesok zsa

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-06-07T14:19:16.754Z

Updated: 2024-08-02T03:50:55.218Z

Reserved: 2024-06-03T17:29:38.329Z

Link: CVE-2024-37162

cve-icon Vulnrichment

Updated: 2024-08-02T03:50:55.218Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-07T15:15:50.617

Modified: 2024-10-31T19:43:26.800

Link: CVE-2024-37162

cve-icon Redhat

No data.