CVE-2024-51479 POC (Proof-of-Concept)

Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.

Published: 2024-12-17

CVSS: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Download CVE-2024-51479 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

Check my portfolio here:

https://tlncglobal.com/poc-513-cve-2024-9061/

https://tlncglobal.com/poc-783-cve-2024-52726/

https://tlncglobal.com/poc-661-cve-2024-6047/

https://tlncglobal.com/poc-862-cve-2024-50329/

https://tlncglobal.com/poc-908-cve-2024-48455/