HomeVercelCVE-2021-37699

CVE-2021-37699

MEDIUM
6.9CVSS
Published: 2021-08-12
Updated: 2024-11-21
AI Analysis

Description

Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when pages/_error.js was statically generated allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. The issue has been patched in release 11.1.0.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
changed
Confidentiality
high
Integrity
low
Availability
none
Weaknesses
CWE-601CWE-601

Metadata

Primary Vendor
VERCEL
Published
8/12/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vercel : next.jsvercel : next.js

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-37699 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com