Skip to content

Security: Undefined Variable next Referenced in Route Error Handler#5460

Open
barttran2k wants to merge 1 commit intoNginxProxyManager:developfrom
barttran2k:contribai/fix/security/undefined-variable-next-referenced-in-ro
Open

Security: Undefined Variable next Referenced in Route Error Handler#5460
barttran2k wants to merge 1 commit intoNginxProxyManager:developfrom
barttran2k:contribai/fix/security/undefined-variable-next-referenced-in-ro

Conversation

@barttran2k
Copy link
Copy Markdown

Problem

The GET /schema route handler's function signature is (req, res) (only two parameters), but the catch block calls next(err). Since next is not defined in this scope, this will throw a ReferenceError at runtime when an error occurs, potentially crashing the process or causing an unhandled rejection instead of properly returning an error response.

Severity: high
File: backend/routes/schema.js

Solution

Add next as the third parameter to the route handler: .get(async (req, res, next) => {, or handle the error directly with res.status(500).send(...) in the catch block.

Changes

  • backend/routes/schema.js (modified)

Testing

  • Existing tests pass
  • Manual review completed
  • No new warnings/errors introduced

The GET /schema route handler's function signature is `(req, res)` (only two parameters), but the catch block calls `next(err)`. Since `next` is not defined in this scope, this will throw a `ReferenceError` at runtime when an error occurs, potentially crashing the process or causing an unhandled rejection instead of properly returning an error response.

Affected files: schema.js

Signed-off-by: Trần Bách <45133811+barttran2k@users.noreply.github.com>
@nginxproxymanagerci
Copy link
Copy Markdown

Docker Image for build 1 is available on DockerHub:

nginxproxymanager/nginx-proxy-manager-dev:pr-5460

Note

Ensure you backup your NPM instance before testing this image! Especially if there are database changes.
This is a different docker image namespace than the official image.

Warning

Changes and additions to DNS Providers require verification by at least 2 members of the community!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant