chore(deps): update dependency hono to v4.12.15#131
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update dependency hono to v4.12.15#131renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
1d38d99 to
4dc0f5d
Compare
4dc0f5d to
50e7253
Compare
50e7253 to
d7a933a
Compare
d7a933a to
7fa8105
Compare
7fa8105 to
dc1a66f
Compare
dc1a66f to
0a2d765
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.12.2→4.12.15Release Notes
honojs/hono (hono)
v4.12.15Compare Source
v4.12.14Compare Source
Security fixes
This release includes fixes for the following security issues:
Improper handling of JSX attribute names in hono/jsx SSR
Affects: hono/jsx. Fixes missing validation of JSX attribute names during server-side rendering, which could allow malformed attribute keys to corrupt the generated HTML output and inject unintended attributes or elements. GHSA-458j-xx4x-4375
Other changes
fa2c74fv4.12.13Compare Source
What's Changed
skipoption by @yusukebe in #4862onCacheNotAvailableoption by @yusukebe in #4876New Contributors
Full Changelog: honojs/hono@v4.12.12...v4.12.13
v4.12.12Compare Source
Security fixes
This release includes fixes for the following security issues:
Middleware bypass via repeated slashes in serveStatic
Affects: Serve Static middleware. Fixes a path normalization inconsistency where repeated slashes (
//) could bypass route-based middleware protections and allow access to protected static files. GHSA-wmmm-f939-6g9cPath traversal in toSSG() allows writing files outside the output directory
Affects:
toSSG()for Static Site Generation. Fixes a path traversal issue where craftedssgParamsvalues could write files outside the configured output directory. GHSA-xf4j-xp2r-rqqxIncorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses
Affects: IP Restriction Middleware. Fixes improper handling of IPv4-mapped IPv6 addresses (e.g.
::ffff:127.0.0.1) that could cause allow/deny rules to be bypassed. GHSA-xpcf-pg52-r92gMissing validation of cookie name on write path in setCookie()
Affects:
setCookie(),serialize(), andserializeSigned()fromhono/cookie. Fixes missing validation of cookie names on the write path, preventing inconsistent handling between parsing and serialization. GHSA-26pp-8wgv-hjvmNon-breaking space prefix bypass in cookie name handling in getCookie()
Affects:
getCookie()fromhono/cookie. Fixes a discrepancy in cookie name handling that could allow attacker-controlled cookies to override legitimate ones and bypass prefix protections. GHSA-r5rp-j6wh-rvv4Users who use Serve Static, Static Site Generation, Cookie utilities, or IP restriction middleware are strongly encouraged to upgrade to this version.
v4.12.11Compare Source
What's Changed
New Contributors
Full Changelog: honojs/hono@v4.12.10...v4.12.11
v4.12.10Compare Source
What's Changed
Simple capturing grouptest by @yusukebe in #4838New Contributors
Full Changelog: honojs/hono@v4.12.9...v4.12.10
v4.12.9Compare Source
What's Changed
parseBodyfrom bodyCache to prevent TypeError by @yusukebe in #4807PickResponseByStatusCodetype by @yusukebe in #4791fire()fallback behavior consistent withhandle()by @yusukebe in #4821New Contributors
Full Changelog: honojs/hono@v4.12.8...v4.12.9
v4.12.8Compare Source
What's Changed
New Contributors
Full Changelog: honojs/hono@v4.12.7...v4.12.8
v4.12.7Compare Source
Security hardening
Ignore
__proto__path segments in parseBody({ dot: true }) to prevent potential prototype pollution when merged with unsafe patterns.Full Changelog: honojs/hono@v4.12.6...v4.12.7
v4.12.6Compare Source
What's Changed
tsconfig.spec.jsonby @yusukebe in #4798New Contributors
Full Changelog: honojs/hono@v4.12.5...v4.12.6
v4.12.5Compare Source
What's Changed
string | undefinedfrom param() when path type is any by @andrewdamelio in #4723@hono/eslint-configby @BarryThePenguin in #4781New Contributors
Full Changelog: honojs/hono@v4.12.4...v4.12.5
v4.12.4Compare Source
Security fixes
This release includes fixes for the following security issues:
SSE Control Field Injection
Affects:
streamSSE()in Streaming Helper. Fixes injection of unintended SSE fields by rejecting CR/LF characters inevent,id, andretry. GHSA-p6xx-57qc-3wxrCookie Attribute Injection in
setCookie()Affects:
setCookie()fromhono/cookie. Fixes cookie attribute manipulation by rejecting;,\r, and\nindomainandpathoptions. GHSA-5pq2-9x2x-5p6wMiddleware Bypass in Serve Static
Affects: Serve Static middleware. Fixes inconsistent URL decoding that could allow protected static resources to be accessed without triggering route-based middleware. GHSA-q5qw-h33p-qvwr
Users who uses Strreaming Helper, Cookie utility, and Serve Static are strongly encouraged to upgrade to this version.
Other changes
tryDecodeURIby @yusukebe in #4779New Contributors
Full Changelog: honojs/hono@v4.12.3...v4.12.4
v4.12.3Compare Source
What's Changed
Math.floorinstead of bitwise OR for safe timestamp by @EdamAme-x in #4754JwtVariablesforContextVariableMapby @yusukebe in #4764New Contributors
Full Changelog: honojs/hono@v4.12.2...v4.12.3
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.