All koa versions

koa @2.15.4

rejected
This version was rejected. It did not pass GreenFlagged's security review and is not served by the registry. The findings and risk dispositions below explain why.
66
Risk Score
MIT
License
No
Install Scripts
23
Dependencies
10
Dev Dependencies
15.5 KB
Package Size
Published

Koa web app framework

Maintainers

niftylettucefengmk2dead_horsejongleberryjuliangruberaarontitanism3imed-jaberiljharbcoderhaoxintjholowaychuk

Keywords

webapphttpapplicationframeworkmiddlewarerack

Dependencies (23)

PackageConstraintRegistry Status
depd ^2.0.0 auto_approved
only ~0.0.2 auto_approved
vary ^1.1.2 auto_approved
debug ^4.3.2 auto_approved
fresh ~0.5.2 auto_approved
accepts ^1.3.5 auto_approved
cookies ~0.9.0 auto_approved
destroy ^1.0.4 auto_approved
type-is ^1.6.16 auto_approved
parseurl ^1.3.2 auto_approved
statuses ^1.5.0 auto_approved
delegates ^1.0.0 auto_approved
encodeurl ^1.0.2 pending
escape-html ^1.0.3 auto_approved
http-assert ^1.3.0 auto_approved
http-errors ^1.6.3 auto_approved
koa-compose ^4.1.0 auto_approved
koa-convert ^2.0.0 auto_approved
on-finished ^2.3.0 auto_approved
content-type ^1.0.4 auto_approved
cache-content-type ^1.0.0 auto_approved
content-disposition ~0.5.2 auto_approved
is-generator-function ^1.0.7 auto_approved

Dev Dependencies (10)

PackageConstraintRegistry Status
jest ^27.0.6 auto_approved
eslint ^7.32.0 auto_approved
supertest ^3.1.0 auto_approved
gen-esm-wrapper ^1.0.6 Not imported
eslint-config-koa ^2.0.0 Not imported
eslint-plugin-node ^11.1.0 auto_approved
eslint-plugin-import ^2.18.2 auto_approved
eslint-plugin-promise ^5.1.0 auto_approved
eslint-config-standard ^16.0.3 auto_approved
eslint-plugin-standard ^5.0.0 auto_approved

Transitive Dependency Tree

57 transitive deps max depth 7
  ├─ accepts ^1.3.5 → 1.3.8
  ├─ cache-content-type ^1.0.0 → 1.0.1
  ├─ content-disposition ~0.5.2 → 0.5.4
  ├─ content-type ^1.0.4 → 1.0.5
  ├─ cookies ~0.9.0 → 0.9.1
  ├─ debug ^4.3.2 → 4.4.3
  ├─ delegates ^1.0.0 → 1.0.0
  ├─ depd ^2.0.0 → 2.0.0
  ├─ destroy ^1.0.4 → 1.2.0
  ├─ encodeurl ^1.0.2
  ├─ escape-html ^1.0.3 → 1.0.3
  ├─ fresh ~0.5.2 → 0.5.2
  ├─ http-assert ^1.3.0 → 1.5.0
  ├─ http-errors ^1.6.3 → 1.8.1
  ├─ is-generator-function ^1.0.7 → 1.1.2
  ├─ koa-compose ^4.1.0 → 4.2.0
  ├─ koa-convert ^2.0.0 → 2.0.0
  ├─ on-finished ^2.3.0 → 2.4.1
  ├─ only ~0.0.2 → 0.0.2
  ├─ parseurl ^1.3.2 → 1.3.3
  ├─ statuses ^1.5.0
  ├─ type-is ^1.6.16 → 1.6.18
├─ vary ^1.1.2 → 1.1.2
  ├─ call-bound ^1.0.4 → 1.0.4
  ├─ co ^4.6.0 → 4.6.0
  ├─ deep-equal ~1.0.1 → 1.0.1
  ├─ depd ~2.0.0 → 2.0.0
  ├─ depd ~1.1.2 → 1.1.2
  ├─ ee-first 1.1.1 → 1.1.1
  ├─ generator-function ^2.0.0 → 2.0.1
  ├─ get-proto ^1.0.1 → 1.0.1
  ├─ has-tostringtag ^1.0.2 → 1.0.2
  ├─ http-errors ~1.8.0 → 1.8.1
  ├─ inherits 2.0.4 → 2.0.4
  ├─ keygrip ~1.1.0 → 1.1.0
  ├─ koa-compose ^4.1.0 → 4.2.0
  ├─ media-typer 0.3.0 → 0.3.0
  ├─ mime-types ~2.1.24 → 2.1.35
  ├─ mime-types ~2.1.34 → 2.1.35
  ├─ mime-types ^2.1.18 → 2.1.35
  ├─ ms ^2.1.3 → 2.1.3
  ├─ negotiator 0.6.3 → 0.6.3
  ├─ safe-buffer 5.2.1 → 5.2.1
  ├─ safe-regex-test ^1.1.0 → 1.1.0
  ├─ setprototypeof 1.2.0 → 1.2.0
  ├─ statuses >= 1.5.0 < 2
  ├─ toidentifier 1.0.1 → 1.0.1
├─ ylru ^1.2.0
  ├─ call-bind-apply-helpers ^1.0.2 → 1.0.2
  ├─ call-bound ^1.0.2 → 1.0.4
  ├─ depd ~1.1.2 → 1.1.2
  ├─ dunder-proto ^1.0.1 → 1.0.1
  ├─ es-errors ^1.3.0 → 1.3.0
  ├─ es-object-atoms ^1.0.0 → 1.1.1
  ├─ get-intrinsic ^1.3.0 → 1.3.1
  ├─ has-symbols ^1.0.3 → 1.1.0
  ├─ inherits 2.0.4 → 2.0.4
  ├─ is-regex ^1.2.1 → 1.2.1
  ├─ mime-db 1.52.0
  ├─ setprototypeof 1.2.0 → 1.2.0
  ├─ statuses >= 1.5.0 < 2
  ├─ toidentifier 1.0.1 → 1.0.1
├─ tsscmp 1.0.6 → 1.0.6
  ├─ async-function ^1.0.0
  ├─ async-generator-function ^1.0.0 → 1.0.0
  ├─ call-bind-apply-helpers ^1.0.2 → 1.0.2
  ├─ call-bind-apply-helpers ^1.0.1 → 1.0.2
  ├─ call-bound ^1.0.2 → 1.0.4
  ├─ es-define-property ^1.0.1 → 1.0.1
  ├─ es-errors ^1.3.0 → 1.3.0
  ├─ es-object-atoms ^1.1.1 → 1.1.1
  ├─ function-bind ^1.1.2 → 1.1.2
  ├─ generator-function ^2.0.0 → 2.0.1
  ├─ get-intrinsic ^1.3.0 → 1.3.1
  ├─ get-proto ^1.0.1
  ├─ gopd ^1.2.0
  ├─ has-symbols ^1.1.0 → 1.1.0
  ├─ has-tostringtag ^1.0.2 → 1.0.2
  ├─ hasown ^2.0.2 → 2.0.3
├─ math-intrinsics ^1.1.0 → 1.1.0
  ├─ async-function ^1.0.0
  ├─ async-generator-function ^1.0.0 → 1.0.0
  ├─ call-bind-apply-helpers ^1.0.2 → 1.0.2
  ├─ es-define-property ^1.0.1 → 1.0.1
  ├─ es-errors ^1.3.0 → 1.3.0
  ├─ es-object-atoms ^1.1.1 → 1.1.1
  ├─ function-bind ^1.1.2 → 1.1.2
  ├─ generator-function ^2.0.0 → 2.0.1
  ├─ get-intrinsic ^1.3.0 → 1.3.1
  ├─ get-proto ^1.0.1
  ├─ gopd ^1.2.0
  ├─ has-symbols ^1.0.3 → 1.1.0
  ├─ has-symbols ^1.1.0 → 1.1.0
  ├─ hasown ^2.0.2 → 2.0.3
├─ math-intrinsics ^1.1.0 → 1.1.0
  ├─ async-function ^1.0.0
  ├─ async-generator-function ^1.0.0 → 1.0.0
  ├─ call-bind-apply-helpers ^1.0.2 → 1.0.2
  ├─ es-define-property ^1.0.1 → 1.0.1
  ├─ es-errors ^1.3.0 → 1.3.0
  ├─ es-object-atoms ^1.1.1 → 1.1.1
  ├─ function-bind ^1.1.2 → 1.1.2
  ├─ generator-function ^2.0.0 → 2.0.1
  ├─ get-proto ^1.0.1
  ├─ gopd ^1.2.0
  ├─ has-symbols ^1.1.0 → 1.1.0
  ├─ hasown ^2.0.2 → 2.0.3
├─ math-intrinsics ^1.1.0 → 1.1.0
  ├─ es-errors ^1.3.0 → 1.3.0
  ├─ function-bind ^1.1.2 → 1.1.2

Changes from v1.7.0

Dependency Changes

ChangePackageVersion
added depd ^2.0.0
added encodeurl ^1.0.2
added koa-convert ^2.0.0
added cache-content-type ^1.0.0
added is-generator-function ^1.0.7
removed co ^4.4.0
removed mime-types ^2.0.7
removed composition ^2.1.1
removed koa-is-json ^1.0.0
removed error-inject ~1.0.0
changed only 0.0.2 → ~0.0.2
changed vary ^1.0.0 → ^1.1.2
changed debug ^2.6.9 → ^4.3.2
changed fresh ^0.5.2 → ~0.5.2
changed accepts ^1.2.2 → ^1.3.5
changed cookies ~0.8.0 → ~0.9.0
changed destroy ^1.0.3 → ^1.0.4
changed type-is ^1.5.5 → ^1.6.16
changed parseurl ^1.3.0 → ^1.3.2
changed statuses ^1.2.0 → ^1.5.0
changed escape-html ~1.0.1 → ^1.0.3
changed http-assert ^1.1.0 → ^1.3.0
changed http-errors ^1.2.8 → ^1.6.3
changed koa-compose ^2.3.0 → ^4.1.0
changed on-finished ^2.1.0 → ^2.3.0
changed content-type ^1.0.0 → ^1.0.4
changed content-disposition ~0.5.0 → ~0.5.2

Script Changes

+ lint+ build+ authors+ prepare - update-authors

File Changes

1 added 1 removed 7 modified size delta: +2.6 KB

Risk Dispositions (1 applicable to this version, 0 other)

Accepted rules are downgraded to INFO on future analyses; rejected rules escalate to CRITICAL.

Rule Source Disposition Author Reason
osv:GHSA-7gcc-r8m5-44qm osv reject AI AI (osv): Host Header Injection vulnerability affects all koa >= 3.0.0 < 3.1.2. Fixed in 3.1.2. Verdict generalizes to all versions in the affected range.

SAST Findings (4)

CRITICAL GHSA-7gcc-r8m5-44qm: Koa has Host Header Injection via ctx.hostname osv

[Always reject] CVSS 7.5 (HIGH) — CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N ## Summary Koa's `ctx.hostname` API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a `@` symbol (e.g., `evil.com:[email protected]`) is received, `ctx.hostname` returns `evil.com` - an attacker-controlled value. Applications using `ctx.hostname` for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks. ## Details The vulnerability exists in Koa's hostname getter in `lib/request.js`: ```javascript // Koa 2.16.1 - lib/request.js get hostname() { const host = this.host; if (!host) return ''; if ('[' === host[0]) return this.URL.hostname || ''; // IPv6 literal return host.split(':', 1)[0]; } ``` The `host` getter retrieves the raw header value with HTTP/2 and proxy support: ```javascript // Koa 2.16.1 - lib/request.js get host() { const proxy = this.app.proxy; let host = proxy && this.get('X-Forwarded-Host'); if (!host) { if (this.req.httpVersionMajor >= 2) host = this.get(':authority'); if (!host) host = this.get('Host'); } if (!host) return ''; return host.split(',')[0].trim(); } ``` ### The Problem The parsing logic simply splits on the first `:` and returns the first segment. There is no validation that the resulting string is a valid hostname per RFC 3986 Section 3.2.2. **RFC 3986 Section 3.2.2** defines the host component as: ``` host = IP-literal / IPv4address / reg-name reg-name = *( unreserved / pct-encoded / sub-delims ) unreserved = ALPHA / DIGIT / "-" / "." / "_" / "~" sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / "," / ";" / "=" ``` The `@` character is explicitly NOT permitted in the host component - it is the delimiter separating userinfo from host in the authority component. ### Attack Vector When an attacker sends: ``` Host: evil.com:[email protected]:3000 ``` Koa parses this as: | API | Returns | Notes | |-----|---------|-------| | `ctx.get('Host')` | `"evil.com:[email protected]:3000"` | Raw header | | `ctx.hostname` | `"evil.com"` | **Attacker-controlled** | | `ctx.host` | `"evil.com:[email protected]:3000"` | Raw header value | | `ctx.origin` | `"http://evil.com:[email protected]:3000"` | Protocol + malformed host | The `ctx.hostname` API returns `evil.com` because the parser splits on the first `:` without understanding that `evil.com:[email protected]` is a malformed authority component where `evil.com:fake` would be interpreted as userinfo by a proper URI parser. ### Additional Concern: `ctx.origin` Koa's `ctx.origin` property concatenates protocol and host without validation: ```javascript // lib/request.js get origin() { return `${this.protocol}://${this.host}`; } ``` Applications using `ctx.origin` for URL generation receive the full malformed Host header value, creating URLs with embedded credentials that browsers may interpret as userinfo. ### HTTP/2 Consideration Koa explicitly checks `httpVersionMajor >= 2` to read the `:authority` pseudo-header: ```javascript if (this.req.httpVersionMajor >= 2) host = this.get(':authority'); ``` The same vulnerability applies - malformed `:authority` values containing userinfo would be accepted and parsed identically. ## PoC ### Setup ```javascript // server.js const Koa = require('koa'); const app = new Koa(); // Simulates password reset URL generation (common vulnerable pattern) app.use(async ctx => { if (ctx.path === '/forgot-password') { const resetToken = 'abc123securtoken'; const resetUrl = `${ctx.protocol}://${ctx.hostname}/reset?token=${resetToken}`; ctx.body = { message: 'Password reset link generated', resetUrl: resetUrl, debug: { rawHost: ctx.get('Host'), parsedHostname: ctx.hostname, origin: ctx.origin, protocol: ctx.protocol } }; } }); app.listen(3000, () => console.log('Server on http://localhost:3000')); ``` ### Exploit ```bash curl -H "Host: evil.com:fake@localhost:3000" http://localhost:3000/forgot-password ``` ### Result ```json { "message": "Password reset link generated", "resetUrl": "http://evil.com/reset?token=abc123securtoken", "debug": { "rawHost": "evil.com:fake@localhost:3000", "parsedHostname": "evil.com", "origin": "http://evil.com:fake@localhost:3000", "protocol": "http" } } ``` The password reset URL points to `evil.com` instead of the legitimate server. In a real attack: 1. Attacker requests password reset for victim's email with malicious Host header 2. Server generates reset link using `ctx.hostname` → `https://evil.com/reset?token=SECRET` 3. Victim receives email with poisoned link 4. Victim clicks link, token is sent to attacker's server 5. Attacker uses token to reset victim's password ### Additional Test Cases ```bash # Basic injection curl -H "Host: evil.com:[email protected]" http://localhost:3000/forgot-password # Result: hostname = "evil.com" # With port preservation attempt curl -H "Host: evil.com:[email protected]:3000" http://localhost:3000/forgot-password # Result: hostname = "evil.com" # Unicode/encoded variations curl -H "Host: evil.com:x%40legitimate.com" http://localhost:3000/forgot-password # Result: hostname = "evil.com" ``` ### Deployment Consideration For this attack to succeed in production, the malicious Host header must reach the Koa application. This occurs when: 1. **No reverse proxy** - Application directly exposed to internet 2. **Misconfigured proxy** - Proxy doesn't override/validate Host header 3. **Proxy trust enabled** (`app.proxy = true`) - `X-Forwarded-Host` can be injected 4. **Default virtual host** - Server is the catch-all for unrecognized Host headers ## Impact ### Vulnerability Type - CWE-20: Improper Input Validation - CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax ### Attack Scenarios **1. Password Reset Poisoning (High Severity)** - Attacker hijacks password reset tokens by poisoning reset URLs - Requires victim to click link in email - Results in account takeover **2. Email Verification Bypass** - Attacker poisons email verification links - Can verify attacker-controlled email on victim accounts **3. OAuth/SSO Callback Manipulation** - Applications using `ctx.hostname` for OAuth redirect URIs - Attacker redirects OAuth callbacks to malicious server - Results in token theft **4. Web Cache Poisoning** - If responses are cached without Host in cache key - Poisoned URLs served to all users - Persistent XSS/phishing via cached responses **5. Server-Side Request Forgery (SSRF)** - Internal routing decisions based on `ctx.hostname` - Attacker manipulates which backend receives requests ### Who Is Impacted - **Direct impact**: Any Koa application using `ctx.hostname` or `ctx.origin` for URL generation without additional validation - **Common patterns**: Password reset, email verification, webhook URL generation, multi-tenant routing, OAuth implementations

MEDIUM GHSA-x2rg-q646-7m2v: Koajs vulnerable to Cross-Site Scripting (XSS) at ctx.redirect() function osv

CVSS 5.0 (MEDIUM) — CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L ### Summary In koa < 2.16.1 and < 3.0.0-alpha.5, passing untrusted user input to ctx.redirect() even after sanitizing it, may execute javascript code on the user who use the app. ### Patches This issue is patched in 2.16.1 and 3.0.0-alpha.5. ### PoC Coming soon... ### Impact 1. Redirect user to another phishing site 2. Make request to another endpoint of the application based on user's cookie 3. Steal user's cookie

LOW No provenance attestation provenance

Package was published without Sigstore provenance. Consider requesting the maintainer enable provenance via CI/CD.

LOW GHSA-jgmv-j7ww-jx2x: Koa Open Redirect via Referrer Header (User-Controlled) osv

CVSS 3.5 (LOW) — CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N ## Summary In the latest version of Koa, the back method used for redirect operations adopts an insecure implementation, which uses the user-controllable referrer header as the redirect target. ## Details on the API document https://www.koajs.net/api/response#responseredirecturl-alt, we can see: **response.redirect(url, [alt])** ``` Performs a [302] redirect to url. The string "back" is specially provided for Referrer support, using alt or "/" when Referrer does not exist. ctx.redirect('back'); ctx.redirect('back', '/index.html'); ctx.redirect('/login'); ctx.redirect('http://google.com'); ``` however, the "back" method is insecure: - https://github.com/koajs/koa/blob/master/lib/response.js#L322 ``` back (alt) { const url = this.ctx.get('Referrer') || alt || '/' this.redirect(url) }, ``` Referrer Header is User-Controlled. ## PoC **there is a demo for POC:** ``` const Koa = require('koa') const serve = require('koa-static') const Router = require('@koa/router') const path = require('path') const app = new Koa() const router = new Router() // Serve static files from the public directory app.use(serve(path.join(__dirname, 'public'))) // Define routes router.get('/test', ctx => { ctx.redirect('back', '/index1.html') }) router.get('/test2', ctx => { ctx.redirect('back') }) router.get('/', ctx => { ctx.body = 'Welcome to the home page! Try accessing /test, /test2' }) app.use(router.routes()) app.use(router.allowedMethods()) const port = 3000 app.listen(port, () => { console.log(`Server running at http://localhost:${port}`) }) ``` **Proof Of Concept** ``` GET /test HTTP/1.1 Host: 127.0.0.1:3000 Referer: http://www.baidu.com Connection: close GET /test2 HTTP/1.1 Host: 127.0.0.1:3000 Referer: http://www.baidu.com Connection: close ``` ![image](https://github.com/user-attachments/assets/03d1e61b-df97-4b42-a0c4-437bd17144db) ![image](https://github.com/user-attachments/assets/f4e076e0-3853-4b7a-b4c0-bddf5b67631a) ## Impact https://learn.snyk.io/lesson/open-redirect/

Review Summary

Risk score: 66. Findings: 1 critical (+40), 2 medium (+20), 2 low (+6).

Commit: 5c2cff7825ac Browse source

Published to npm: