4.10.3
3 years ago
1 days ago
Known vulnerabilities in the hono package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Unverified Ownership via the JWT authentication process. An attacker can gain unauthorized access to protected resources by presenting a valid token intended for a different audience when multiple services share the same issuer or keys. How to fix Unverified Ownership? Upgrade | >=1.1.0 <4.10.2 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to HTTP Request Smuggling via the Note:
This is exploitable if the deployment environment or runtime does not reject requests with both How to fix HTTP Request Smuggling? Upgrade | <4.9.7 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) through the How to fix Cross-site Request Forgery (CSRF)? Upgrade | <4.6.5 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF) via the How to fix Cross-Site Request Forgery (CSRF)? Upgrade | <4.5.8 |
hono is an Ultrafast web framework for the Edges Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') such that when using How to fix Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')? Upgrade | <4.2.7 |