Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-16877 PoC — ZEIT Next.js 路径遍历漏洞

Source
Associated Vulnerability
Title:ZEIT Next.js 路径遍历漏洞 (CVE-2017-16877)
Description:ZEIT Next.js是一款开源的通用webapps开发框架。 ZEIT Next.js 2.4.1之前的版本中存在目录遍历漏洞。攻击者可利用该漏洞获取敏感信息。
Description
ZEIT Next.js before 2.4.1 is susceptible to local file inclusion via the /_next and /static request namespace, allowing attackers to obtain sensitive information.
File Snapshot

id: CVE-2017-16877 info: name: Nextjs <2.4.1 - Local File Inclusion author: pikpikcu severity ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.