CVE-2024-23340

@hono/node-server is an adapter that allows users to run Hono applications on Node.js. Since v1.3.0, @hono/node-server has used its own Request object with `url` behavior that is unexpected. In the standard API, if the URL contains `..`, here called "double dots", the URL string returned by Request will be in the resolved path. However, the `url` in @hono/node-server's Request as does not resolve double dots, so `http://localhost/static/.. /foo.txt` is returned. This causes vulnerabilities when using `serveStatic`. Modern web browsers and a latest `curl` command resolve double dots on the client side, so this issue doesn't affect those using either of those tools. However, problems may occur if accessed by a client that does not resolve them. Version 1.4.1 includes the change to fix this issue. As a workaround, don't use `serveStatic`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hono:node-server:*:*:*:*:*:node.js:*:*

History

30 Jan 2024, 14:30

Type Values Removed Values Added
CPE cpe:2.3:a:hono:node-server:*:*:*:*:*:node.js:*:*
First Time Hono node-server
Hono
References () https://github.com/honojs/node-server/blob/8cea466fd05e6d2e99c28011fc0e2c2d3f3397c9/src/request.ts#L43-L45 - () https://github.com/honojs/node-server/blob/8cea466fd05e6d2e99c28011fc0e2c2d3f3397c9/src/request.ts#L43-L45 - Product
References () https://github.com/honojs/node-server/commit/dd9b9a9b23e3896403c90a740e7f1f0892feb402 - () https://github.com/honojs/node-server/commit/dd9b9a9b23e3896403c90a740e7f1f0892feb402 - Patch
References () https://github.com/honojs/node-server/security/advisories/GHSA-rjq5-w47x-x359 - () https://github.com/honojs/node-server/security/advisories/GHSA-rjq5-w47x-x359 - Exploit, Vendor Advisory

23 Jan 2024, 13:44

Type Values Removed Values Added
Summary
  • (es) @hono/node-server es un adaptador que permite a los usuarios ejecutar aplicaciones Hono en Node.js. Desde v1.3.0, @hono/node-server ha utilizado su propio objeto Request con un comportamiento de `url` inesperado. En la API estándar, si la URL contiene `..`, aquí denominada "puntos dobles", la cadena de URL devuelta por la Solicitud estará en la ruta resuelta. Sin embargo, la `url` en la solicitud de @hono/node-server no resuelve los puntos dobles, por lo que se devuelve `http://localhost/static/.. /foo.txt`. Esto provoca vulnerabilidades al utilizar `serveStatic`. Los navegadores web modernos y el último comando `curl` resuelven los puntos dobles en el lado del cliente, por lo que este problema no afecta a quienes utilizan cualquiera de esas herramientas. Sin embargo, pueden ocurrir problemas si accede un cliente que no los resuelve. La versión 1.4.1 incluye el cambio para solucionar este problema. Como workaround, no utilice "serveStatic".

22 Jan 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 23:15

Updated : 2024-01-30 14:30


NVD link : CVE-2024-23340

Mitre link : CVE-2024-23340

CVE.ORG link : CVE-2024-23340


JSON object : View

Products Affected

hono

  • node-server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')