CVE-2023-46298
JavaScript vulnerability analysis and mitigation

Overview

CVE-2023-46298 affects Next.js versions before 13.4.20-canary.13. The vulnerability stems from a missing cache-control header in empty prefetch responses, which can be cached by Content Delivery Networks (CDNs). The issue was discovered and disclosed in October 2023 (NVD, CVE).

Technical details

The vulnerability occurs when Next.js fails to include a cache-control header for empty prefetch responses. This technical oversight allows CDNs to cache these empty responses. The severity of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 7.5 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) (NVD).

Impact

When exploited, this vulnerability can cause a denial of service condition affecting all users requesting the same URL through the affected CDN. This occurs because the CDN caches and serves the empty response instead of forwarding the request to the origin server (NVD).

Mitigation and workarounds

The vulnerability was patched in Next.js version 13.4.20-canary.13. Users should upgrade to this version or later to resolve the issue. The fix involves adding proper cache-control headers for prefetch empty responses (Github PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management