Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
5 résultats taggé next.js  ✕
CVE-2025-29927: Next.js Middleware Authorization Bypass https://projectdiscovery.io/blog/nextjs-middleware-authorization-bypass
27/03/2025 08:44:44
QRCode
archive.org
thumbnail

Next.js is an open-source web framework built by Vercel that powers React-based apps with features like server-side and static rendering. Recently, a critical vulnerability (CVE) was disclosed that lets attackers bypass middleware-based authorization checks. The issue was originally discovered and analyzed by Rachid Allam (zhero). In this blog, we’ll break down the vulnerability and walk through their research and will create a Nuclei template to help you detect it across your assets.

projectdiscovery EN 2025 next.js vulnerabilty CVE-2025-29927 analysis
Doing the Due Diligence: Analyzing the Next.js Middleware Bypass (CVE-2025-29927) https://slcyber.io/assetnote-security-research-center/doing-the-due-diligence-analysing-the-next-js-middleware-bypass-cve-2025-29927/
24/03/2025 10:09:04
QRCode
archive.org

This critical vulnerability allowed attackers to bypass authentication implemented in the middleware layer. With the popularity of this framework on the internet and within our customers' attack surfaces, our Security Research team took a deeper look at the issue.

slcyber EN 2025 Next.js Middleware Bypass check CVE-2025-29927 middleware
Next.js and the corrupt middleware: the authorizing artifact https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
23/03/2025 13:58:47
QRCode
archive.org

Recently, Yasser Allam, known by the pseudonym inzo_, and I, decided to team up for some research. We discussed potential targets and chose to begin by focusing on Next.js (130K stars on github, currently downloaded + 9,4 million times per week), a framework I know quite well and with which I already have fond memories, as evidenced by my previous work. Therefore, the “we” throughout this paper will naturally refer to the two of us.

Next.js is a comprehensive javascript framework based on React, packed with numerous features — the perfect playground for diving into the intricacies of research. We set out, fueled by faith, curiosity, and resilience, to explore its lesser-known aspects, hunting for hidden treasures waiting to be found.

It didn’t take long before we uncovered a great discovery in the middleware. The impact is considerable, with all versions affected, and no preconditions for exploitability — as we’ll demonstrate shortly.

zhero-web-sec. EN 2025 CVE-2025-29927 Next.js exploit bypass
How to find Next.js on your network https://www.runzero.com/blog/next-js/
23/03/2025 13:55:21
QRCode
archive.org
thumbnail

How to find Next.js on your network

runzero EN 2025 Next.js CVE-2025-29927 Howto
Next.js Middleware Exploit: Deep Dive into CVE-2025-29927 Authorization Bypass - ZeroPath Blog https://zeropath.com/blog/nextjs-middleware-cve-2025-29927-auth-bypass
23/03/2025 13:53:00
QRCode
archive.org
thumbnail

Explore the critical CVE-2025-29927 vulnerability in Next.js middleware, enabling attackers to bypass authorization checks and gain unauthorized access.

zeropath EN 2025 unauthorized access Web-Application-Security Vulnerability Next.js middleware CVE-2025-29927
4350 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio