3 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

15 Oct 2024 — Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue. • https://github.com/honojs/hono/security/advisories/GHSA-2234-fmw7-43wr • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

22 Aug 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8. • https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

23 Apr 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue. Hono es un framework de aplicación web que brinda soporte para cualquier tiempo de ejecución de JavaScript. • https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •