.. / CVE-2017-16877

Exploit for Nextjs <2.4.1 - Local File Inclusion (CVE-2017-16877)

Description:

ZEIT Next.js before 2.4.1 is susceptible to local file inclusion via the /_next and /static request namespace, allowing attackers to obtain sensitive information.

Nuclei Template

View the template here CVE-2017-16877.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2017/CVE-2017-16877.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9
https://github.com/zeit/next.js/releases/tag/2.4.1
https://nvd.nist.gov/vuln/detail/CVE-2017-16877
https://github.com/vercel/next.js/commit/02fe7cf63f6265d73bdaf8bc50a4f2fb539dcd00