-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test: add test ensuring GHSA-f82v-jwr5-mffw
doesn't affect Next.js on Netlify
#2778
Conversation
📊 Package size report No changes
Unchanged files
🤖 This report was automatically generated by pkg-size-action |
GHSA-f82v-jwr5-mffw
doesn't affect Next.js on Netlify
test("requests with x-middleware-subrequest don't skip middleware (GHSA-f82v-jwr5-mffw)", async ({ | ||
middlewareSubrequestVuln, | ||
}) => { | ||
const response = await fetch(`${middlewareSubrequestVuln.url}`, { | ||
headers: { | ||
'x-middleware-subrequest': 'middleware:middleware:middleware:middleware:middleware', | ||
}, | ||
}) | ||
|
||
// middleware was not skipped | ||
expect(response.headers.get('x-test-used-middleware')).toBe('true') | ||
|
||
// ensure we are testing version before the fix for self hosted | ||
expect(response.headers.get('x-test-used-next-version')).toBe('15.2.2') | ||
}) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This test is inspired by vercel/next.js@52a078d#diff-c5e08cd8ee165bce3a9fb81c8315d6e149b76f6f9b2e53f70bb2f39fb248d2aeR148-R157
Just assertions are hopefully more readable in their intention - goal is to ensure that middleware is not skipped when x-middleware-subrequest
request header with 5+ hops is provided ( as then https://github.com/vercel/next.js/blob/cdb9a8c3b355593ab19ee6dec7c59e622bf59c81/packages/next/src/server/web/sandbox/sandbox.ts#L96-L114 this code path with early bail (circuit breaker to prevent infinite recursion) would be executed that would skip execution of actual middleware - at least when self hosting, but we don't even use this code path for our handling)
Documentation
This is ensuring Next.js apps hosted on Netlify are not affected by GHSA-f82v-jwr5-mffw
Our custom edge middleware implementation doesn't make use of
x-middleware-subrequest
header. But just for good measure - let's add test ensuring that suppling this header to request against app using vulnerable Next.js version (15.2.2, so one patch before fix for self hosted)