关联漏洞
描述
PoC for a full exploitation of NextJS SSRF (CVE-2024-34351)
介绍
# CVE-2024-34351 Exploit
- [CVE-2024-34351 PoC](https://github.com/azu/nextjs-CVE-2024-34351/)
- [Next.js Server-Side Request Forgery in Server Actions · CVE-2024-34351 · GitHub Advisory Database](https://github.com/advisories/GHSA-fr5h-rqp8-mj6g)
- [Digging for SSRF in NextJS apps](https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps)
## Summary
PoC for a full exploitation of NextJS SSRF. An attacker can get any website content from Next.js server using CVE-2024-34351 vulnerability.
This vulnerability is fixed in `next@14.1.1`.
## Usage
- Prepare a redirect server.
```
deno run --allow-net --allow-read attacker-server.ts
```
- Modify `Host` header to attacker server
- Modify `Origin` header to attacker server
- Finally you can change the resource placed in the `Origin` header to specify where to redirect to


文件快照
[4.0K] /data/pocs/9d46f643587c9c75efd9d322be307042ef3822ba
├── [1.1K] attacker-server.py
├── [ 914] attacker-server.ts
├── [4.0K] examples
│ ├── [178K] 1.png
│ └── [152K] 2.png
└── [ 908] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。