Description

zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.

INFO

Published Date :

2024-06-07T14:19:16.754Z

Last Modified :

2024-08-02T03:50:55.218Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-37162 vulnerability.

Vendors Products
Idopesok
  • Zsa
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-37162.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact