I got an email from Vercel urging to upgrade Next.js based project 3 days ago. POC was published 2 days ago. Today I’ve checked my logs and I could already see attack attempts.
I got an email from Vercel urging to upgrade Next.js based project 3 days ago. POC was published 2 days ago. Today I’ve checked my logs and I could already see attack attempts.
This only affects sites that use the fancy new-fangled SSR rendering from what I’ve read. ReactJS (Client side) sites wouldn’t be affected.
I think their point was that CSR-only sites would be unaffected, which should be true. Exploiting it on a static site, for example, couldn’t be RCE because the untrusted code is only being executed on the client side (and therefore is not remote).
Now, most people use, or at least are recommended to use, SSR/RSC these days. Many frameworks make SSR enabled by default. But using raw React with no Next.js, react-router, etc. to create a client-side only site does likely protect you from this vulnerability.
I typically use React with only CSR, since I’m normally building apps with it over more static websites. Frameworks with SSR are popular, but there’s nothing wrong with an app that downloads and caches itself with a Service Worker when said app has a lot of interactivity and is likely to be used more than once.