Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32652
HistoryApr 19, 2024 - 6:29 p.m.

CVE-2024-32652 @hono/node-server contains Denial of Service risk when receiving Host header that cannot be parsed

2024-04-1918:29:42
CWE-755
GitHub_M
www.cve.org
denial of service
hono application
node.js
cve-2024-32652
host header
url parsing

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

15.7%

The adapter @hono/node-server allows you to run your Hono application on Node.js. Prior to 1.10.1, the application hangs when receiving a Host header with a value that @hono/node-server can’t handle well. Invalid values are those that cannot be parsed by the URL as a hostname such as an empty string, slashes /, and other strings. The version 1.10.1 includes the fix for this issue.

CNA Affected

[
  {
    "vendor": "honojs",
    "product": "node-server",
    "versions": [
      {
        "version": ">= 1.3.0, < 1.10.1",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2024-32652