ghsa-fmvm-x8mv-47mj
Vulnerability from github
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the next.config.js
file must have an images.domains
array assigned and the image host assigned in images.domains
must allow user-provided SVG. If the next.config.js
file has images.loader
assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change next.config.js
to use a different loader configuration
other than the default.
Impact
- Affected: All of the following must be true to be affected
- Next.js between version 10.0.0 and 12.0.10
- The
next.config.js
file has images.domains array assigned - The image host assigned in images.domains allows user-provided SVG
- Not affected: The
next.config.js
file has images.loader assigned to something other than default
Patches
Workarounds
Change next.config.js
to use a different loader configuration other than the default, for example:
js
module.exports = {
images: {
loader: 'imgix',
path: 'https://example.com/myaccount/',
},
}
Or if you want to use the loader
prop on the component, you can use custom
:
js
module.exports = {
images: {
loader: 'custom',
},
}
{ "affected": [ { "package": { "ecosystem": "npm", "name": "next" }, "ranges": [ { "events": [ { "introduced": "10.0.0" }, { "fixed": "12.1.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-23646" ], "database_specific": { "cwe_ids": [ "CWE-451" ], "github_reviewed": true, "github_reviewed_at": "2022-02-17T17:19:18Z", "nvd_published_at": "2022-02-17T21:15:00Z", "severity": "MODERATE" }, "details": "Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` must allow user-provided SVG. If the `next.config.js` file has `images.loader` assigned to something other than default, the instance is not affected. Version 12.1.0 contains a patch for this issue. As a workaround, change `next.config.js` to use a different `loader configuration` other than the default.\n\n### Impact\n- **Affected**: All of the following must be true to be affected\n - Next.js between version 10.0.0 and 12.0.10\n - The `next.config.js` file has [images.domains](https://nextjs.org/docs/api-reference/next/image#domains) array assigned\n - The image host assigned in [images.domains](https://nextjs.org/docs/api-reference/next/image#domains) allows user-provided SVG\n- **Not affected**: The `next.config.js` file has [images.loader](https://nextjs.org/docs/api-reference/next/image#loader-configuration) assigned to something other than default\n\n### Patches\n[Next.js 12.1.0](https://github.com/vercel/next.js/releases/tag/v12.1.0)\n\n### Workarounds\nChange `next.config.js` to use a different [loader configuration](https://nextjs.org/docs/api-reference/next/image#loader-configuration) other than the default, for example:\n\n```js\nmodule.exports = {\n images: {\n loader: \u0027imgix\u0027,\n path: \u0027https://example.com/myaccount/\u0027,\n },\n}\n```\n\nOr if you want to use the [`loader`](https://nextjs.org/docs/api-reference/next/image#loader) prop on the component, you can use `custom`:\n```js\nmodule.exports = {\n images: {\n loader: \u0027custom\u0027,\n },\n}\n```\n\n", "id": "GHSA-fmvm-x8mv-47mj", "modified": "2022-02-23T15:26:32Z", "published": "2022-02-17T17:19:18Z", "references": [ { "type": "WEB", "url": "https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23646" }, { "type": "WEB", "url": "https://github.com/vercel/next.js/pull/34075" }, { "type": "PACKAGE", "url": "https://github.com/vercel/next.js" }, { "type": "WEB", "url": "https://github.com/vercel/next.js/releases/tag/v12.1.0" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.