CVE-2021-37699 – next
Package
Manager: npm
Name: next
Vulnerable Version: >=10.0.5 <=10.2.0 || >=11.0.0 <=11.1.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0043 pctl0.61717
Details
Open Redirect in Next.js Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. ### Impact - **Affected:** Users of Next.js between `10.0.5` and `10.2.0` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export` - **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected - **Not affected:** Deployments **with** `pages/404.js` - Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. We recommend upgrading to the latest version of Next.js to improve the overall security of your application. ### Patches https://github.com/vercel/next.js/releases/tag/v11.1.0
Metadata
Created: 2021-08-12T14:51:14Z
Modified: 2022-04-28T20:32:19Z
Source: MANUAL
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-vxf5-wxwp-m7g9
Finding: F156
Auto approve: 1