
CVE-2024-48913 – Hono vulnerable to bypass of CSRF Middleware by a request without Content-Type header.
https://notcve.org/view.php?id=CVE-2024-48913
15 Oct 2024 — Hono, a web framework, prior to version 4.6.5 is vulnerable to bypass of cross-site request forgery (CSRF) middleware by a request without Content-Type header. Although the CSRF middleware verifies the Content-Type Header, Hono always considers a request without a Content-Type header to be safe. This can allow an attacker to bypass CSRF protection implemented with Hono CSRF middleware. Version 4.6.5 fixes this issue. • https://github.com/honojs/hono/security/advisories/GHSA-2234-fmw7-43wr • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-43787 – Hono CSRF middleware can be bypassed using crafted Content-Type header
https://notcve.org/view.php?id=CVE-2024-43787
22 Aug 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8. • https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-32869 – Hono vulnerable to Restricted Directory Traversal in serveStatic with deno
https://notcve.org/view.php?id=CVE-2024-32869
23 Apr 2024 — Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue. Hono es un framework de aplicación web que brinda soporte para cualquier tiempo de ejecución de JavaScript. • https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-50710 – Hono's named path parameters can be overridden in TrieRouter
https://notcve.org/view.php?id=CVE-2023-50710
14 Dec 2023 — Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. • https://github.com/honojs/hono/commit/8e2b6b08518998783f66d31db4f21b1b1eecc4c8 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2020-27220
https://notcve.org/view.php?id=CVE-2020-27220
14 Jan 2021 — The Eclipse Hono AMQP and MQTT protocol adapters do not check whether an authenticated gateway device is authorized to receive command & control messages when it has subscribed only to commands for a specific device. The missing check involves verifying that the command target device is configured giving permission for the gateway device to act on its behalf. This means an authenticated device of a certain tenant, notably also a non-gateway device acting like a gateway, may receive command & control message... • https://bugs.eclipse.org/bugs/show_bug.cgi?id=569856 • CWE-862: Missing Authorization •

CVE-2020-27217
https://notcve.org/view.php?id=CVE-2020-27217
13 Nov 2020 — In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter ... • https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068 • CWE-1284: Improper Validation of Specified Quantity in Input •