fix(deps): update dependency hono to v3.11.7 [security] - autoclosed #9235
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.11.4
->3.11.7
GitHub Vulnerability Alerts
CVE-2023-50710
Impact
The clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources.
TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter.
The code to reproduce it. The server side application:
The client code which makes requests to the server application:
The results:
Patches
"v3.11.7" includes the change to fix this issue.
Workarounds
Don't use TrieRouter directly.
References
Router options on the Hono website: https://hono.dev/api/hono#router-option
Release Notes
honojs/hono (hono)
v3.11.7
Compare Source
Security Update
This release includes a security patch that fixes the vulnerability in TrieRouter.
If you are using the default preset or
hono/quick
, or specifying the router asTrieRouter
, you must upgrade to this version3.11.7
immediately.How to upgrade
For Deno
Just increment the version specifier to
v3.11.7
.For Node.js
Upgrade the
hono
package via npm:You may not update the
hono
package withnpm update
, so please usenpm install
.The vulnerability detail
The clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources.
TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter.
The advisory: GHSA-f6gv-hh8j-q8vq
Our Approach to Security
If you discover such a vulnerability, please contact us immediately. We will respond immediately; we have enabled GitHub's private vulnerability reporting feature, so please use that.
https://github.com/honojs/hono/security/advisories
Thanks.
Full Changelog: honojs/hono@v3.11.6...v3.11.7
v3.11.6
Compare Source
What's Changed
status
correctly by @yusukebe in https://github.com/honojs/hono/pull/1814Full Changelog: honojs/hono@v3.11.5...v3.11.6
v3.11.5
Compare Source
What's Changed
hono/tiny
size by @ryuapp in https://github.com/honojs/hono/pull/1809c.json()
allows object and returns JSONParsed by @yusukebe in https://github.com/honojs/hono/pull/1806New Contributors
Full Changelog: honojs/hono@v3.11.4...v3.11.5
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.