CVE-2024-23340:
@hono/node-server cannot handle "double dots" in URL
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55718%
CWE
Published
1/23/2024
Updated
1/23/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@hono/node-server | npm | >= 1.3.0, < 1.4.1 | 1.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the url getter in src/request.ts
which directly used the raw incoming URL without path normalization. The commit diff shows the fix added path resolution using Node.js
's path.resolve()
when detecting '..' sequences. This matches the CWE-22 (Path Traversal) description and the advisory's impact statement about improper path handling. The vulnerable code was explicitly shown in pre-patch versions of the file, making this a clear root cause.