SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse

4 snips
Mar 24, 2025
A critical vulnerability in Next.js could allow unauthorized access, raising alarms about middleware verification. The need for immediate patching is emphasized to protect applications. Meanwhile, Microsoft's Trust Signing Service is exploited by attackers to generate signatures for malware. This alarming trend sheds light on the potential dangers of poor verification processes in software development. Understanding these vulnerabilities is crucial for maintaining robust cybersecurity practices.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Next.js Middleware Vulnerability

  • Middleware in modern web apps like Next.js can introduce vulnerabilities.
  • Attackers can exploit header spoofing to bypass authorization, especially by manipulating the x-middleware-subrequest header.
ADVICE

Header Verification and Middleware Complexity

  • Verify or digitally sign headers to enhance security.
  • Minimize middleware complexity and avoid excessive back-end requests.
ADVICE

Patch Next.js and Review Proxies

  • Patch Next.js vulnerabilities promptly to maintain security.
  • Review proxy pipelines and simplify complex middleware structures.
Get the Snipd Podcast app to discover more snips from this episode
Get the app