← Volver a CVEs
CVE-2024-37162
MEDIUM4.0
Descripcion
zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
Detalles CVE
Puntuacion CVSS v3.14.0
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/7/2024
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
idopesok:zsa
Debilidades (CWE)
CWE-209CWE-209
Referencias
https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a(security-advisories@github.com)
https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8(security-advisories@github.com)
https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.