CVE-2023-46729:
Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint
6.1
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/9/2023
Updated
11/17/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@sentry/nextjs | npm | >= 7.26.0, < 7.77.0 | 7.77.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure regex patterns in the tunnel rewrite configuration. The commit diff shows the fix replaced '.' with strict patterns ([a-fA-F0-9] for orgid, \d* for projectid). The setUpTunnelRewriteRules function was responsible for creating these vulnerable rewrite rules that didn't properly validate input, allowing attackers to craft malicious URLs that bypassed domain restrictions. This matches the SSRF impact described in the advisory where arbitrary HTTP requests could be sent via manipulated parameters.