Descripción
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header modified, and below conditions are also met, an attacker may be able make requests appear originating from application server itself. The required 1) running self-hosted manner; 2) makes use of Actions; 3) Action performs redirect relative path which starts with `/`. This fixed `14.1.1`.
https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085
https://github.com/vercel/next.js/pull/62561
https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g
https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085
https://github.com/vercel/next.js/pull/62561
https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g