TROYANOSYVIRUS
Back to CVEs

CVE-2024-37162

MEDIUM
4.0

Description

zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.

CVE Details

CVSS v3.1 Score4.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/7/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

idopesok:zsa

Weaknesses (CWE)

CWE-209CWE-209

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.