logo

CVE-2023-46729 @sentry/nextjs

Package

Manager: npm
Name: @sentry/nextjs
Vulnerable Version: >=7.26.0 <7.77.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.0109 pctl0.77103

Details

Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint ### Impact An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This could open door for other attack vectors: * client-side vulnerabilities: XSS/CSRF in the context of the trusted domain; * interaction with internal network; * read cloud metadata endpoints (AWS, Azure, Google Cloud, etc.); * local/remote port scan. This issue only affects users who have [Next.js SDK tunneling feature](https://docs.sentry.io/platforms/javascript/guides/nextjs/manual-setup/#configure-tunneling-to-avoid-ad-blockers) enabled. ### Patches The problem has been fixed in [sentry/nextjs@7.77.0](https://www.npmjs.com/package/@sentry/nextjs/v/7.77.0) ### Workarounds Disable tunneling by removing the `tunnelRoute` option from Sentry Next.js SDK config — `next.config.js` or `next.config.mjs`. ### References * [Sentry Next.js tunneling feature](https://docs.sentry.io/platforms/javascript/guides/nextjs/manual-setup/#configure-tunneling-to-avoid-ad-blockers) * [The fix](https://github.com/getsentry/sentry-javascript/pull/9415) * [More Information](https://blog.sentry.io/next-js-sdk-security-advisory-cve-2023-46729/) ### Credits * [Praveen Kumar](https://hackerone.com/mr_x_strange)

Metadata

Created: 2023-11-09T22:03:44Z
Modified: 2023-11-17T21:55:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-2rmr-xw8m-22q9/GHSA-2rmr-xw8m-22q9.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-2rmr-xw8m-22q9
Finding: F100
Auto approve: 1