Inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next.js, leading to desynchronized responses. This led to a response queue poisoning vulnerability in the affected Next.js versions.
For a request to be exploitable, the affected route also had to be making use of the rewrites feature in Next.js.
The vulnerability is resolved in Next.js 13.5.1
and newer. This includes Next.js 14.x
.
There are no official workarounds for this vulnerability. We recommend that you upgrade to a safe version.
https://portswigger.net/web-security/request-smuggling/advanced/response-queue-poisoning
{ "nvd_published_at": "2024-05-14T15:38:41Z", "cwe_ids": [ "CWE-444" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-05-09T21:07:00Z" }