Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0418 | @hono/node-server is an adapter that allows users to run Hono applications on Node.js. Since v1.3.0, @hono/node-server has used its own Request object with `url` behavior that is unexpected. In the standard API, if the URL contains `..`, here called "double dots", the URL string returned by Request will be in the resolved path. However, the `url` in @hono/node-server's Request as does not resolve double dots, so `http://localhost/static/.. /foo.txt` is returned. This causes vulnerabilities when using `serveStatic`. Modern web browsers and a latest `curl` command resolve double dots on the client side, so this issue doesn't affect those using either of those tools. However, problems may occur if accessed by a client that does not resolve them. Version 1.4.1 includes the change to fix this issue. As a workaround, don't use `serveStatic`. |
Github GHSA |
GHSA-rjq5-w47x-x359 | @hono/node-server cannot handle "double dots" in URL |
Sat, 31 May 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-30T14:21:51.423Z
Reserved: 2024-01-15T15:19:19.444Z
Link: CVE-2024-23340
Updated: 2024-08-01T22:59:32.309Z
Status : Modified
Published: 2024-01-22T23:15:08.637
Modified: 2024-11-21T08:57:32.643
Link: CVE-2024-23340
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA