Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-37162
HistoryJun 07, 2024 - 2:19 p.m.

CVE-2024-37162 zsa Generates Error Messages Containing Sensitive Information

2024-06-0714:19:16
CWE-209
GitHub_M
github.com
1
cve-2024-37162
next.js
parse error stack
sensitive information
unauthorized access
production build
server environment
attacker
vulnerability
patch 0.3.3

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on 0.3.3.

CNA Affected

[
  {
    "vendor": "IdoPesok",
    "product": "zsa",
    "versions": [
      {
        "version": "< 0.3.3",
        "status": "affected"
      }
    ]
  }
]

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-37162