Build(deps): [security] bump next from 14.1.0 to 14.1.1 in /ui
Bumps next from 14.1.0 to 14.1.1. This update includes a security fix.
Vulnerabilities fixed
Next.js Server-Side Request Forgery in Server Actions
Impact
A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions by security researchers at Assetnote. If the
Host
header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.Prerequisites
- Next.js (
<14.1.1
) is running in a self-hosted* manner.- The Next.js application makes use of Server Actions.
- The Server Action performs a redirect to a relative path which starts with a
/
.* Many hosting providers (including Vercel) route requests based on the Host header, so we do not believe that this vulnerability affects any Next.js applications where routing is done in this manner.
Patches
This vulnerability was patched in #62561 and fixed in Next.js
14.1.1
.Workarounds
There are no official workarounds for this vulnerability. We recommend upgrading to Next.js
14.1.1
.Credit
Vercel and the Next.js team thank Assetnote for responsibly disclosing this issue to us, and for working with us to verify the fix. Thanks to:
Adam Kues - Assetnote
... (truncated)
Patched versions: 14.1.1 Affected versions: >= 13.4.0, < 14.1.1
Commits
-
5f59ee5
v14.1.1 -
f48b90b
even more -
7f789f4
more timeout -
ab71c4c
update timeout -
75f60d9
update trigger release workflow -
74b3f0f
Server Action tests (#62655) -
a6946b6
Backport metadata fixes (#62663) -
4002f4b
Fix draft mode invariant (#62121) -
7dbf6f8
fix: babel usage with next/image (#61835) -
3efc842
Fix next/server apit push alias for ESM pkg (#61721) - Additional commits viewable in compare view