Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐳 chore: Update dependency next to v14.2.10 [SECURITY] #101

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 10, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
next (source) 14.0.2 -> 14.2.10 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-34351

Impact

A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the Host header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.

Prerequisites

  • Next.js (<14.1.1) is running in a self-hosted* manner.
  • The Next.js application makes use of Server Actions.
  • The Server Action performs a redirect to a relative path which starts with a /.

* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.

Patches

This vulnerability was patched in #​62561 and fixed in Next.js 14.1.1.

Workarounds

There are no official workarounds for this vulnerability. We recommend upgrading to Next.js 14.1.1.

Credit

Vercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:

Adam Kues - Assetnote
Shubham Shah - Assetnote

CVE-2024-46982

Impact

By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it could coerce Next.js to cache a route that is meant to not be cached and send a Cache-Control: s-maxage=1, stale-while-revalidate header which some upstream CDNs may cache as well.

To be potentially affected all of the following must apply:

  • Next.js between 13.5.1 and 14.2.9
  • Using pages router
  • Using non-dynamic server-side rendered routes e.g. pages/dashboard.tsx not pages/blog/[slug].tsx

The below configurations are unaffected:

  • Deployments using only app router
  • Deployments on Vercel are not affected

Patches

This vulnerability was resolved in Next.js v13.5.7, v14.2.10, and later. We recommend upgrading regardless of whether you can reproduce the issue or not.

Workarounds

There are no official or recommended workarounds for this issue, we recommend that users patch to a safe version.

Credits

  • Allam Rachid (zhero_)
  • Henry Chen

CVE-2024-47831

Impact

The image optimization feature of Next.js contained a vulnerability which allowed for a potential Denial of Service (DoS) condition which could lead to excessive CPU consumption.

Not affected:

  • The next.config.js file is configured with images.unoptimized set to true or images.loader set to a non-default value.
  • The Next.js application is hosted on Vercel.

Patches

This issue was fully patched in Next.js 14.2.7. We recommend that users upgrade to at least this version.

Workarounds

Ensure that the next.config.js file has either images.unoptimized, images.loader or images.loaderFile assigned.

Credits

Brandon Dahler (brandondahler), AWS
Dimitrios Vlastaras


Release Notes

vercel/next.js (next)

v14.2.10

Compare Source

v14.2.9

Compare Source

v14.2.8

Compare Source

v14.2.7

Compare Source

v14.2.6

Compare Source

v14.2.5

Compare Source

v14.2.4

Compare Source

[!NOTE]
This release is backporting bug fixes. It does not include all pending features/changes on canary.

Core Changes
  • fix: ensure route handlers properly track dynamic access (#​66446)
  • fix NextRequest proxy in edge runtime (#​66551)
  • Fix next/dynamic with babel and src dir (#​65177)
  • Use vercel deployment url for metadataBase fallbacks (#​65089)
  • fix(next/image): detect react@19 for fetchPriority prop (#​65235)
  • Fix loading navigation with metadata and prefetch (#​66447)
  • prevent duplicate RSC fetch when action redirects (#​66620)
  • ensure router cache updates reference the latest cache values (#​66681)
  • Prevent append of trailing slash in cases where path ends with a file extension (#​66636)
  • Fix inconsistency with 404 getStaticProps cache-control (#​66674)
  • Use addDependency to track metadata route file changes (#​66714)
  • Add timeout/retry handling for fetch cache (#​66652)
  • fix: app-router prefetch crash when an invalid URL is passed to Link (#​66755)
Credits

Huge thanks to @​ztanner, @​ijjk, @​wbinnssmith, @​huozhi, and @​lubieowoce for helping!

v14.2.3

Compare Source

v14.2.2

Compare Source

v14.2.1

Compare Source

v14.2.0

Compare Source

v14.1.4

Compare Source

v14.1.3

Compare Source

v14.1.2

Compare Source

v14.1.1

Compare Source

Note: this is a backport release for critical bug fixes -- this does not include all pending features/changes on canary

Core Changes
Credits

Huge thanks to @​huozhi, @​shuding, @​Ethan-Arrowood, @​styfle, @​ijjk, @​ztanner, @​balazsorban44, @​kdy1, and @​williamli for helping!

v14.1.0

Compare Source

v14.0.4

Compare Source

v14.0.3

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

vercel bot commented May 10, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
knowledge-graph-demo ❌ Failed (Inspect) Sep 17, 2024 11:15pm

@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from fa4972a to 84dd4a4 Compare May 13, 2024 03:54
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 84dd4a4 to 5085e2c Compare May 13, 2024 07:25
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 5085e2c to 89f83e4 Compare May 15, 2024 07:30
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 89f83e4 to b9bc774 Compare May 23, 2024 04:53
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from b9bc774 to 16613f5 Compare May 23, 2024 07:30
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 16613f5 to c3ba861 Compare May 24, 2024 04:01
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from c3ba861 to 3728a87 Compare May 30, 2024 05:14
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 3728a87 to c6cd29e Compare May 30, 2024 08:50
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from c6cd29e to 07737d8 Compare June 2, 2024 04:40
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 07737d8 to 550c11d Compare June 3, 2024 02:20
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 550c11d to 5dedd69 Compare June 6, 2024 04:24
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 5dedd69 to edc7812 Compare June 14, 2024 11:25
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from edc7812 to 711cc36 Compare June 14, 2024 14:44
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 711cc36 to a2482c6 Compare June 15, 2024 03:12
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from cbb8bef to fe3c0a9 Compare June 30, 2024 03:10
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from fe3c0a9 to 92cbb7b Compare June 30, 2024 06:49
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 92cbb7b to 003416f Compare July 6, 2024 05:21
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 003416f to e028ba4 Compare July 6, 2024 06:23
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from e028ba4 to fd2e033 Compare July 13, 2024 03:27
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from fd2e033 to c46db07 Compare July 17, 2024 03:02
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from c46db07 to f169fd3 Compare July 17, 2024 06:06
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from f169fd3 to 6c883b2 Compare July 24, 2024 04:04
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 6c883b2 to 5411ec2 Compare July 24, 2024 07:15
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 5411ec2 to 42990ff Compare July 28, 2024 03:17
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 42990ff to d8e8168 Compare July 29, 2024 04:32
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from d8e8168 to 4ea8d4a Compare July 29, 2024 07:36
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 4ea8d4a to 8386acf Compare July 31, 2024 01:35
@renovate renovate bot force-pushed the renovate/npm-next-vulnerability branch from 8386acf to c12c588 Compare September 17, 2024 23:15
@renovate renovate bot changed the title 🐳 chore: Update dependency next to v14.1.1 [SECURITY] 🐳 chore: Update dependency next to v14.2.10 [SECURITY] Sep 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants