Vulnerability Description
zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Idopesok | Zsa | < 0.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3aPatch
- https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8Vendor Advisory
- https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3aPatch
- https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8Vendor Advisory
FAQ
What is CVE-2024-37162?
CVE-2024-37162 is a vulnerability with a CVSS score of 4.0 (MEDIUM). zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. Th...
How severe is CVE-2024-37162?
CVE-2024-37162 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-37162?
Check the references section above for vendor advisories and patch information. Affected products include: Idopesok Zsa.