| タイトル | Cloudflare, Inc. の create-cloudflare 等複数ベンダの製品におけるサーバサイドのリクエストフォージェリの脆弱性 |
|---|---|
| 概要 | Cloudflare, Inc. の create-cloudflare 等複数ベンダの製品には、サーバサイドのリクエストフォージェリの脆弱性が存在します。 |
| 想定される影響 | 情報を取得される、および情報を改ざんされる可能性があります。 |
| 対策 | 参考情報を参照して適切な対策を実施してください。 |
| 公表日 | 2025年6月16日0:00 |
| 登録日 | 2025年8月8日18:11 |
| 最終更新日 | 2025年8月8日18:11 |
| CVSS3.0 : 緊急 | |
| スコア | 9.1 |
|---|---|
| ベクター | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
| OpenNext |
| OpenNext for Cloudflare 1.3.0 未満 |
| Cloudflare, Inc. |
| create-cloudflare 2.49.3 未満 |
| No | 変更内容 | 変更日 |
|---|---|---|
| 1 | [2025年08月07日] 掲載 | 2025年8月7日16:12 |
| 概要 | A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package. The vulnerability stems from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed unauthenticated users to proxy arbitrary remote content via the /_next/image endpoint. This issue allowed attackers to load remote resources from arbitrary hosts under the victim site’s domain for any site deployed using the Cloudflare adapter for Open Next. For example: https://victim-site.com/_next/image?url=https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site’s domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Impact: * SSRF via unrestricted remote URL loading * Arbitrary remote content loading * Potential internal service exposure or phishing risks through domain abuse Mitigation: The following mitigations have been put in place: * Server side updates to Cloudflare’s platform to restrict the content loaded via the /_next/image endpoint to images. The update automatically mitigates the issue for all existing and any future sites deployed to Cloudflare using the affected version of the Cloudflare adapter for Open Next * Root cause fix https://github.com/opennextjs/opennextjs-cloudflare/pull/727 to the Cloudflare adapter for Open Next. The patched version of the adapter is found here @opennextjs/cloudflare@1.3.0 https://www.npmjs.com/package/@opennextjs/cloudflare/v/1.3.0 * Package dependency update https://github.com/cloudflare/workers-sdk/pull/9608 to create-cloudflare (c3) to use the fixed version of the Cloudflare adapter for Open Next. The patched version of create-cloudflare is found here: create-cloudflare@2.49.3 https://www.npmjs.com/package/create-cloudflare/v/2.49.3 In addition to the automatic mitigation deployed on Cloudflare’s platform, we encourage affected users to upgrade to @opennext/cloudflare v1.3.0 and use the remotePatterns https://nextjs.org/docs/pages/api-reference/components/image#remotepatterns filter in Next config https://nextjs.org/docs/pages/api-reference/components/image#remotepatterns if they need to allow-list external urls with images assets. |
|---|---|
| 公表日 | 2025年6月17日4:15 |
| 登録日 | 2025年6月18日4:01 |
| 最終更新日 | 2025年6月17日4:15 |