Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-50710
HistoryDec 14, 2023 - 5:22 p.m.

CVE-2023-50710 Hono's named path parameters can be overridden in TrieRouter

2023-12-1417:22:26
CWE-94
GitHub_M
www.cve.org
1
hono
trierouter
path parameters
privilege escalation
rest api

CVSS3

4.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

20.6%

Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.

CNA Affected

[
  {
    "vendor": "honojs",
    "product": "hono",
    "versions": [
      {
        "version": "< 3.11.7",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

20.6%

Related for CVELIST:CVE-2023-50710