
CVE-2024-48913 – Hono vulnerable to bypass of CSRF Middleware by a request without Content-Type header.
https://notcve.org/view.php?id=CVE-2024-48913
15 Oct 2024 — Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue. • https://github.com/honojs/hono/security/advisories/GHSA-2234-fmw7-43wr • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-43787 – Hono CSRF middleware can be bypassed using crafted Content-Type header
https://notcve.org/view.php?id=CVE-2024-43787
22 Aug 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8. • https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-32869 – Hono vulnerable to Restricted Directory Traversal in serveStatic with deno
https://notcve.org/view.php?id=CVE-2024-32869
23 Apr 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue. Hono es un framework de aplicación web que brinda soporte para cualquier tiempo de ejecución de JavaScript. • https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2024-32652 – @hono/node-server contains Denial of Service risk when receiving Host header that cannot be parsed
https://notcve.org/view.php?id=CVE-2024-32652
19 Apr 2024 — The adapter @hono/node-server allows you to run your Hono application on Node.js. Prior to 1.10.1, the application hangs when receiving a Host header with a value that `@hono/node-server` can't handle well. Invalid values are those that cannot be parsed by the `URL` as a hostname such as an empty string, slashes `/`, and other strings. The version 1.10.1 includes the fix for this issue. El adaptador @hono/node-server le permite ejecutar su aplicación Hono en Node.js. • https://github.com/honojs/node-server/commit/d847e60249fd8183ba0998bc379ba20505643204 • CWE-755: Improper Handling of Exceptional Conditions •