CVE-2024-56332 – next
Package
Manager: npm
Name: next
Vulnerable Version: >=13.0.0 <13.5.8 || >=14.0.0 <14.2.21 || >=15.0.0 <15.1.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00472 pctl0.63711
Details
Next.js Allows a Denial of Service (DoS) with Server Actions ### Impact A Denial of Service (DoS) attack allows attackers to construct requests that leaves requests to Server Actions hanging until the hosting provider cancels the function execution. _Note: Next.js server is idle during that time and only keeps the connection open. CPU and memory footprint are low during that time._ Deployments without any protection against long running Server Action invocations are especially vulnerable. Hosting providers like Vercel or Netlify set a default maximum duration on function execution to reduce the risk of excessive billing. This is the same issue as if the incoming HTTP request has an invalid `Content-Length` header or never closes. If the host has no other mitigations to those then this vulnerability is novel. This vulnerability affects only Next.js deployments using Server Actions. ### Patches This vulnerability was resolved in Next.js 14.2.21, 15.1.2, and 13.5.8. We recommend that users upgrade to a safe version. ### Workarounds There are no official workarounds for this vulnerability. ### Credits Thanks to the PackDraw team for responsibly disclosing this vulnerability.
Metadata
Created: 2025-01-03T20:19:29Z
Modified: 2025-01-03T21:48:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-7m27-7ghc-44w9/GHSA-7m27-7ghc-44w9.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-7m27-7ghc-44w9
Finding: F002
Auto approve: 1