I got an email from Vercel urging to upgrade Next.js based project 3 days ago. POC was published 2 days ago. Today I’ve checked my logs and I could already see attack attempts.
Yeah been scrambling to get this one patched.
This only affects sites that use the fancy new-fangled SSR rendering from what I’ve read. ReactJS (Client side) sites wouldn’t be affected.
Are we still vulnerable if our app doesn’t use React Server Functions endpoints?
Potentially. According to the React Team, even if React Server Functions are not in-use, the vulnerability is still exploitable if React Server Components are supported.
I typically use React with only CSR, since I’m normally building apps with it over more static websites. Frameworks with SSR are popular, but there’s nothing wrong with an app that downloads and caches itself with a Service Worker when said app has a lot of interactivity and is likely to be used more than once.
We were very lucky that our usage was on the literal version before the affected version. Dodged a bullet.
deleted by creator




