You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Observe the 500 error in the response and the logs.
Current vs. Expected behavior
Provide environment information
Operating System:
Platform: darwin
Arch: arm64
Version: Darwin Kernel Version 23.6.0: Thu Sep 12 23:35:29 PDT 2024; root:xnu-10063.141.1.701.1~1/RELEASE_ARM64_T6000
Available memory (MB): 32768
Available CPU cores: 10
Binaries:
Node: 20.12.1
npm: 10.5.1
Yarn: 1.22.22
pnpm: 9.15.4
Relevant Packages:
next: 14.2.23 // An outdated version detected (latest is 15.1.6), upgrade is highly recommended!
eslint-config-next: N/A
react: 18.3.1
react-dom: 18.3.1
typescript: 5.7.3
Next.js Config:
output: N/A
⚠ An outdated version detected (latest is 15.1.6), upgrade is highly recommended!
Please try the latest canary version (`npm install next@canary`) to confirm the issue still exists before creating a new issue.
Read more - https://nextjs.org/docs/messages/opening-an-issue
Which area(s) are affected? (Select all that apply)
Pages Router, Runtime
Which stage(s) are affected? (Select all that apply)
Other (Deployed)
Additional context
Only version 14 (latest) has this issue, while version 15 does not have this problem.
On our side, it's a major problem because it generates many 500 errors when there's a potential attack, disrupts our QoS, and triggers the onColl (likely "on Collaboration" or "on Collect") alerts.
ale-grosselle
changed the title
500 status caused by Cache Poisoning and XSS attacks
Cache Poisoning and XSS attacks caused a 500 status code (QoS issue)
Jan 26, 2025
Link to the code that reproduces this issue
https://github.com/ale-grosselle/next-js-bug-500
To Reproduce
Fetch Request Example
Current vs. Expected behavior
Provide environment information
Which area(s) are affected? (Select all that apply)
Pages Router, Runtime
Which stage(s) are affected? (Select all that apply)
Other (Deployed)
Additional context
Only version 14 (latest) has this issue, while version 15 does not have this problem.
On our side, it's a major problem because it generates many 500 errors when there's a potential attack, disrupts our QoS, and triggers the onColl (likely "on Collaboration" or "on Collect") alerts.
https://cyberpress.org/critical-vulnerability-in-next-js-framework-exposes-websites/
The text was updated successfully, but these errors were encountered: