header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

Well-known front-end framework Next.js exposed a high-risk vulnerability, and multiple encryption platforms are facing security risks

2024-05-10 09:41

BlockBeats reported that on May 10, SlowMist Chief Information Security Officer 23pds said that the well-known React front-end development framework Next.js was found to have an SSRF vulnerability (CVE-2024-34351), which can be exploited by attackers to read arbitrary files on the server.


23pds pointed out that a large number of platforms in the encryption industry are using the Next.js framework for development, which will face serious security risks if not fixed in time. The official patch has been released, and the vulnerability can be fixed by upgrading Next.js to the latest v14.1.1 version.


SSRF (Server-Side Request Forgery) is a security vulnerability constructed by an attacker to initiate a request from the server. Generally, the target of SSRF attacks is internal systems that cannot be accessed from the external network.

举报 Correction/Report
This platform has fully integrated the Farcaster protocol. If you have a Farcaster account, you canLogin to comment
Correction/Report
Submit
Add Library
Visible to myself only
Public
Save
Choose Library
Add Library
Cancel
Finish