Products
Hono Web application framework
- 4.5.8
Source
security-advisories@github.com
Tags
CVE-2024-43787 details
Published : Aug. 22, 2024, 3:15 p.m.
Last Modified : Aug. 22, 2024, 3:15 p.m.
Last Modified : Aug. 22, 2024, 3:15 p.m.
Description
Hono is a Web application framework that provides support for any JavaScript runtime. Hono CSRF middleware can be bypassed using crafted Content-Type header. MIME types are case insensitive, but isRequestedByFormElementRe only matches lower-case. As a result, attacker can bypass csrf middleware using upper-case form-like MIME type. This vulnerability is fixed in 4.5.8.
CVSS Score
1 | 2 | 3 | 4 | 5.0 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-352 | Cross-Site Request Forgery (CSRF) | The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
Base Score
5.0
Exploitability Score
1.6
Impact Score
3.4
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
References
URL | Source |
---|---|
https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17 | security-advisories@github.com |
https://github.com/honojs/hono/commit/41ce840379516410dee60c783142e05bb5a22449 | security-advisories@github.com |
https://github.com/honojs/hono/security/advisories/GHSA-rpfr-3m35-5vx5 | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.