
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse
4 snips
Mar 24, 2025 A critical vulnerability in Next.js could allow unauthorized access, raising alarms about middleware verification. The need for immediate patching is emphasized to protect applications. Meanwhile, Microsoft's Trust Signing Service is exploited by attackers to generate signatures for malware. This alarming trend sheds light on the potential dangers of poor verification processes in software development. Understanding these vulnerabilities is crucial for maintaining robust cybersecurity practices.
AI Snips
Chapters
Transcript
Episode notes
Next.js Middleware Vulnerability
- Middleware in modern web apps like Next.js can introduce vulnerabilities.
- Attackers can exploit header spoofing to bypass authorization, especially by manipulating the x-middleware-subrequest header.
Header Verification and Middleware Complexity
- Verify or digitally sign headers to enhance security.
- Minimize middleware complexity and avoid excessive back-end requests.
Patch Next.js and Review Proxies
- Patch Next.js vulnerabilities promptly to maintain security.
- Review proxy pipelines and simplify complex middleware structures.
