Jake Saunders wrote about discovering that a recent Next.js vulnerability allowed hackers access to their server through an Umami instance. I use Umami, too!

I logged into my VPS and didn’t see any suspicious files or running processes. I then opened my Umami dashboard to poke around, and my browser immediately opened a window to a gambling site. Well, shit.

Damage assessment

The browser’s developer console showed that an onclick event was added to the <html> object, and this was originating from a file disguised to look like a standard Next.js library file used by Umami. So the attacker was able to modify and add files, as well as spoof the modified date to hide their tracks.

Umami was runni…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help