Lucene search

K
cveGitHub_MCVE-2023-50710
HistoryDec 14, 2023 - 6:15 p.m.

CVE-2023-50710

2023-12-1418:15:45
CWE-94
GitHub_M
web.nvd.nist.gov
19
hono
web framework
typescript
cve-2023-50710
security vulnerability
rest api
trierouter
nvd

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

20.6%

Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.

Affected configurations

Nvd
Vulners
Node
honohonoRange<3.11.7node.js
VendorProductVersionCPE
honohono*cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*

CNA Affected

[
  {
    "vendor": "honojs",
    "product": "hono",
    "versions": [
      {
        "version": "< 3.11.7",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

20.6%

Related for CVE-2023-50710