Skip to content

Incorrect handling of CORS preflight request headers in hapi

Moderate severity GitHub Reviewed Published Jun 7, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm hapi (npm)

Affected versions

< 11.0.0

Patched versions

11.0.0

Description

Versions of hapi prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden.

If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.

Recommendation

Update to version 11.0.0 or later.

References

Published to the GitHub Advisory Database Jun 7, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

0.112%
(46th percentile)

Weaknesses

CVE ID

CVE-2015-9236

GHSA ID

GHSA-vwrf-r5r4-7775

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.