-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency hono to v4.5.8 [SECURITY] #130
Conversation
🏗️ E2E / py-no-cli-runner (#1114) • ➡️ View in Autoblocks 🔴 python-e2e-test-suite-1-no-cli-runner x = "x1" y = "y1"
Test Case Duration
Test Case Duration
Test Case Duration Generated by Autoblocks against 2b0b95b |
🏗️ E2E / ts-no-cli-runner (#1114) • ➡️ View in Autoblocks 🔴 typescript-e2e-test-suite-1-no-cli-runner
Test Case Duration
Test Case Duration Generated by Autoblocks against 2b0b95b |
✗ 🟢 typescript-e2e-test-suite-1-with-cli-runner
🔴 typescript-e2e-test-suite-2-with-cli-runner
Generated by Autoblocks against 2b0b95b |
✗ 🟢 python-e2e-test-suite-1-with-cli-runner x = "x1" y = "y1"
🔴 python-e2e-test-suite-1-with-cli-runner x = "x2" y = "y1"
🔴 python-e2e-test-suite-2-with-cli-runner
Generated by Autoblocks against 2b0b95b |
This PR contains the following updates:
4.5.5
->4.5.8
GitHub Vulnerability Alerts
CVE-2024-43787
Summary
Hono CSRF middleware can be bypassed using crafted Content-Type header.
Details
MIME types are case insensitive, but
isRequestedByFormElementRe
only matches lower-case.https://github.com/honojs/hono/blob/b0af71fbcc6dbe44140ea76f16d68dfdb32a99a0/src/middleware/csrf/index.ts#L16-L17
As a result, attacker can bypass csrf middleware using upper-case form-like MIME type, such as "Application/x-www-form-urlencoded".
PoC
Impact
Bypass csrf protection implemented with hono csrf middleware.
Discussion
I'm not sure that omitting csrf checks for Simple POST request is a good idea.
CSRF prevention and CORS are different concepts even though CORS can prevent CSRF in some cases.
Release Notes
honojs/hono (hono)
v4.5.8
Compare Source
Security Fix for CSRF Protection Middleware
Before this release, in versions 4.5.7 and below, the CSRF Protection Middleware did not treat requests including
Content-Types
with uppercase letters (e.g.,Application/x-www-form-urlencoded
) as potential attacks, allowing them to pass.This could cause unexpected behavior, leading to a vulnerability. If you are using the CSRF Protection Middleware, please upgrade to version 4.5.8 or higher immediately.
For more details, see the report here: GHSA-rpfr-3m35-5vx5
v4.5.7
Compare Source
What's Changed
target
andformtarget
attribute types by @ssssota in https://github.com/honojs/hono/pull/3299New Contributors
Full Changelog: honojs/hono@v4.5.6...v4.5.7
v4.5.6
Compare Source
What's Changed
New Contributors
Full Changelog: honojs/hono@v4.5.5...v4.5.6
Configuration
📅 Schedule: Branch creation - "" in timezone America/Chicago, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.