I got an email from Vercel urging to upgrade Next.js based project 3 days ago. POC was published 2 days ago. Today I’ve checked my logs and I could already see attack attempts.

  • PortNull@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    6
    ·
    14 hours ago

    Are we still vulnerable if our app doesn’t use React Server Functions endpoints?

    Potentially. According to the React Team, even if React Server Functions are not in-use, the vulnerability is still exploitable if React Server Components are supported.

    • TehPers@beehaw.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      10 hours ago

      I think their point was that CSR-only sites would be unaffected, which should be true. Exploiting it on a static site, for example, couldn’t be RCE because the untrusted code is only being executed on the client side (and therefore is not remote).

      Now, most people use, or at least are recommended to use, SSR/RSC these days. Many frameworks make SSR enabled by default. But using raw React with no Next.js, react-router, etc. to create a client-side only site does likely protect you from this vulnerability.

      • kungen@feddit.nu
        link
        fedilink
        arrow-up
        2
        ·
        8 hours ago

        Now, most people use, or at least are recommended to use, SSR/RSC these days.

        Why though?