{"id":"CVE-2017-16877","details":"ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.","aliases":["GHSA-3f5c-4qxj-vmpf"],"modified":"2026-04-10T04:13:54.547395Z","published":"2017-11-17T17:29:00.337Z","references":[{"type":"ADVISORY","url":"https://github.com/zeit/next.js/releases/tag/2.4.1"},{"type":"FIX","url":"https://github.com/vercel/next.js/commit/02fe7cf63f6265d73bdaf8bc50a4f2fb539dcd00"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vercel/next.js","events":[{"introduced":"0"},{"fixed":"02fe7cf63f6265d73bdaf8bc50a4f2fb539dcd00"},{"fixed":"dd4b4dd9d0e7e64080bed04d9e21f43933f8021f"}]},{"type":"GIT","repo":"https://github.com/zeit/next.js","events":[{"introduced":"0"},{"fixed":"dd4b4dd9d0e7e64080bed04d9e21f43933f8021f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.4.1"}]}}],"versions":["1.0.0","1.0.1","1.0.2","1.1.0","1.1.1","1.1.2","1.2.0","1.2.1","1.2.2","1.2.3","2.0.0","2.0.0-beta.0","2.0.0-beta.1","2.0.0-beta.10","2.0.0-beta.11","2.0.0-beta.12","2.0.0-beta.13","2.0.0-beta.14","2.0.0-beta.15","2.0.0-beta.16","2.0.0-beta.17","2.0.0-beta.18","2.0.0-beta.19","2.0.0-beta.2","2.0.0-beta.20","2.0.0-beta.21","2.0.0-beta.22","2.0.0-beta.23","2.0.0-beta.24","2.0.0-beta.25","2.0.0-beta.26","2.0.0-beta.27","2.0.0-beta.28","2.0.0-beta.29","2.0.0-beta.3","2.0.0-beta.30","2.0.0-beta.31","2.0.0-beta.32","2.0.0-beta.33","2.0.0-beta.34","2.0.0-beta.35","2.0.0-beta.36","2.0.0-beta.37","2.0.0-beta.38","2.0.0-beta.39","2.0.0-beta.4","2.0.0-beta.40","2.0.0-beta.41","2.0.0-beta.42","2.0.0-beta.5","2.0.0-beta.6","2.0.0-beta.7","2.0.0-beta.8","2.0.0-beta.9","2.0.1","2.1.0","2.1.1","2.2.0","2.3.0","2.3.1","2.3.2","2.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-16877.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}