[Aikido] Fix 11 security issues in hono, socket.io-parser, h3 and 3 more#424
[Aikido] Fix 11 security issues in hono, socket.io-parser, h3 and 3 more#424aikido-autofix[bot] wants to merge 1 commit intomainfrom
Conversation
|
PR SummaryMedium Risk Overview Also updates formatting in Written by Cursor Bugbot for commit 6b95d0d. This will update automatically on new commits. Configure here. |
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
| "react": ">=18.3.1", | ||
| "react-dom": ">=18.3.1", | ||
| "thirdweb": "^5.68.0", | ||
| "thirdweb": "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337", |
There was a problem hiding this comment.
Nightly thirdweb build committed in security fix PR
Medium Severity
The thirdweb devDependency was changed from "^5.68.0" to a nightly pre-release build ("5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337"). This appears to be a testing artifact accidentally included in a PR that's meant to only fix security vulnerabilities. Nightly builds are unstable by definition and pinning to one in a committed package.json can cause reproducibility issues and unexpected breakage.


Upgrade dependencies to fix critical authorization bypass in Hono, memory exhaustion DoS in Socket.IO, SSE injection in h3, and DoS vulnerabilities in Axios and related packages.
✅ 11 CVEs resolved by this upgrade, including 1 critical 🚨 CVE
This PR will resolve the following CVEs:
parseBody({ dot: true })where specially crafted form field names like__proto__.xcreate objects with__proto__properties, potentially enabling prototype pollution if merged unsafely into other objects.basicAuthandbearerAuthmiddlewares used non-timing-safe string comparison for hash validation, potentially allowing timing-based analysis attacks. The vulnerability has been fixed by implementing constant-time comparison to prevent early termination.\r) characters in data and comment fields, allowing attackers to inject arbitrary SSE events, spoof event types, and split single push() calls into multiple browser-parsed events. This bypasses a prior fix that only addressed newline (\n) injection.🔗 Related Tasks
PR-Codex overview
This PR focuses on updating dependency versions and restructuring configuration in
package.jsonand related files to enhance project setup and maintainability.Detailed summary
packageManagerinpackage.json.lint-stagedconfiguration for better readability.hono,socket.io-parser,h3,axios,lodash.thirdwebversion inpackages/agw-web/package.json.devDependenciesandpeerDependenciesacross multiple files.typesVersionsformatting inpackages/agw-react/package.json.pnpm-lock.yaml.