CVE-2024-37162

zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*

History

31 Oct 2024, 19:43

Type Values Removed Values Added
References () https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a - () https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a - Patch
References () https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8 - () https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-209
First Time Idopesok
Idopesok zsa
CPE cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*

07 Jun 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-07 15:15

Updated : 2024-10-31 19:43


NVD link : CVE-2024-37162

Mitre link : CVE-2024-37162


JSON object : View

Products Affected

idopesok

  • zsa
CWE
CWE-209

Generation of Error Message Containing Sensitive Information