4.12.8
4 years ago
7 days ago
Known vulnerabilities in the hono package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Prototype Pollution in How to fix Prototype Pollution? Upgrade | <4.12.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to CRLF Injection via the How to fix CRLF Injection? Upgrade | >=3.8.0 <4.12.4 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Improper Handling of URL Encoding (Hex Encoding) via inconsistent URL decoding between the Note: This vulnerability specifically affects applications that rely solely on route-based middleware to protect static subpaths. How to fix Improper Handling of URL Encoding (Hex Encoding)? Upgrade | <4.12.4 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to CRLF Injection via the Notes:
How to fix CRLF Injection? Upgrade | >=0.2.1 <4.12.4 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade | <4.11.10 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Use of Cache Containing Sensitive Information via improper handling of HTTP cache control directives, including How to fix Use of Cache Containing Sensitive Information? Upgrade | <4.11.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Incorrect Authorization via improper validation of user-supplied paths in the How to fix Incorrect Authorization? Upgrade | <4.11.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade | <4.11.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Incorrect Regular Expression in the form of the How to fix Incorrect Regular Expression? Upgrade | <4.11.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm due to the JWT verification middleware using unsafe default fallback algorithm. An attacker can gain unauthorized access or escalate privileges by crafting JWTs with manipulated Note: Users that configured their app without JWK/JWKS middleware or explicitly restrict allowed algorithms are not affected. How to fix Use of a Broken or Risky Cryptographic Algorithm? Upgrade | <4.11.4 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature due to the JWT verification middleware fallback on unverified JWT header when Note: Users that configured their app without JWK/JWKS middleware or explicitly restrict allowed algorithms are not affected. How to fix Improper Verification of Cryptographic Signature? Upgrade | <4.11.4 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to HTTP Request Smuggling via the CORS middleware, which copies the Note:
This is exploitable if shared caches or proxies rely on the How to fix HTTP Request Smuggling? Upgrade | <4.10.3 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Unverified Ownership via the JWT authentication process. An attacker can gain unauthorized access to protected resources by presenting a valid token intended for a different audience when multiple services share the same issuer or keys. How to fix Unverified Ownership? Upgrade | >=1.1.0 <4.10.2 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to HTTP Request Smuggling via the Note:
This is exploitable if the deployment environment or runtime does not reject requests with both How to fix HTTP Request Smuggling? Upgrade | <4.9.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the How to fix Cross-site Request Forgery (CSRF)? Upgrade | <4.6.5 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) via the How to fix Cross-Site Request Forgery (CSRF)? Upgrade | <4.5.8 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') such that when using How to fix Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')? Upgrade | <4.2.7 |