cve/2024/CVE-2024-34350.md
2025-09-29 16:08:36 +00:00

19 lines
1.2 KiB
Markdown

### [CVE-2024-34350](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34350)
![](https://img.shields.io/static/v1?label=Product&message=next.js&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%2013.4.0%2C%20%3C%2013.5.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20('HTTP%20Request%2FResponse%20Smuggling')&color=brighgreen)
### Description
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions. For a request to be exploitable, the affected route also had to be making use of the [rewrites](https://nextjs.org/docs/app/api-reference/next-config-js/rewrites) feature in Next.js. The vulnerability is resolved in Next.js `13.5.1` and newer.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/XiaomingX/weekly
- https://github.com/nomi-sec/PoC-in-GitHub