Skip to content

Update dependency koa to v2.16.4 [SECURITY]#274

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/npm-koa-vulnerability
Open

Update dependency koa to v2.16.4 [SECURITY]#274
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/npm-koa-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Feb 12, 2025

This PR contains the following updates:

Package Change Age Confidence
koa (source) 2.13.12.16.4 age confidence

Inefficient Regular Expression Complexity in koa

CVE-2025-25200 / GHSA-593f-38f6-jp5m

More information

Details

Summary

Koa uses an evil regex to parse the X-Forwarded-Proto and X-Forwarded-Host HTTP headers. This can be exploited to carry out a Denial-of-Service attack.

PoC

Coming soon.

Impact

This is a Regex Denial-of-Service attack and causes memory exhaustion. The regex should be improved and empty values should not be allowed.

Severity

  • CVSS Score: 9.2 / 10 (Critical)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Koajs vulnerable to Cross-Site Scripting (XSS) at ctx.redirect() function

CVE-2025-32379 / GHSA-x2rg-q646-7m2v

More information

Details

Summary

In koa < 2.16.1 and < 3.0.0-alpha.5, passing untrusted user input to ctx.redirect() even after sanitizing it, may execute javascript code on the user who use the app.

Patches

This issue is patched in 2.16.1 and 3.0.0-alpha.5.

PoC

Coming soon...

Impact
  1. Redirect user to another phishing site
  2. Make request to another endpoint of the application based on user's cookie
  3. Steal user's cookie

Severity

  • CVSS Score: 5.0 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Koa Open Redirect via Referrer Header (User-Controlled)

CVE-2025-8129 / GHSA-jgmv-j7ww-jx2x

More information

Details

Summary

In the latest version of Koa, the back method used for redirect operations adopts an insecure implementation, which uses the user-controllable referrer header as the redirect target.

Details

on the API document https://www.koajs.net/api/response#responseredirecturl-alt, we can see:

response.redirect(url, [alt])

Performs a [302] redirect to url.
The string "back" is specially provided for Referrer support, using alt or "/" when Referrer does not exist.

ctx.redirect('back');
ctx.redirect('back', '/index.html');
ctx.redirect('/login');
ctx.redirect('http://google.com');

however, the "back" method is insecure:

  back (alt) {
    const url = this.ctx.get('Referrer') || alt || '/'
    this.redirect(url)
  },

Referrer Header is User-Controlled.

PoC

there is a demo for POC:

const Koa = require('koa')
const serve = require('koa-static')
const Router = require('@&#8203;koa/router')
const path = require('path')

const app = new Koa()
const router = new Router()

// Serve static files from the public directory
app.use(serve(path.join(__dirname, 'public')))

// Define routes
router.get('/test', ctx => {
  ctx.redirect('back', '/index1.html')
})

router.get('/test2', ctx => {
  ctx.redirect('back')
})

router.get('/', ctx => {
  ctx.body = 'Welcome to the home page! Try accessing /test, /test2'
})

app.use(router.routes())
app.use(router.allowedMethods())

const port = 3000
app.listen(port, () => {
  console.log(`Server running at http://localhost:${port}`)
}) 

Proof Of Concept

GET /test HTTP/1.1
Host: 127.0.0.1:3000
Referer: http://www.baidu.com
Connection: close

GET /test2 HTTP/1.1
Host: 127.0.0.1:3000
Referer: http://www.baidu.com
Connection: close

image

image

Impact

https://learn.snyk.io/lesson/open-redirect/

Severity

  • CVSS Score: 2.0 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Koa has Host Header Injection via ctx.hostname

CVE-2026-27959 / GHSA-7gcc-r8m5-44qm

More information

Details

Summary

Koa's ctx.hostname API performs naive parsing of the HTTP Host header, extracting everything before the first colon without validating the input conforms to RFC 3986 hostname syntax. When a malformed Host header containing a @ symbol (e.g., evil.com:fake@legitimate.com) is received, ctx.hostname returns evil.com - an attacker-controlled value. Applications using ctx.hostname for URL generation, password reset links, email verification URLs, or routing decisions are vulnerable to Host header injection attacks.

Details

The vulnerability exists in Koa's hostname getter in lib/request.js:

// Koa 2.16.1 - lib/request.js
get hostname() {
  const host = this.host;
  if (!host) return '';
  if ('[' === host[0]) return this.URL.hostname || ''; // IPv6 literal
  return host.split(':', 1)[0];
}

The host getter retrieves the raw header value with HTTP/2 and proxy support:

// Koa 2.16.1 - lib/request.js
get host() {
  const proxy = this.app.proxy;
  let host = proxy && this.get('X-Forwarded-Host');
  if (!host) {
    if (this.req.httpVersionMajor >= 2) host = this.get(':authority');
    if (!host) host = this.get('Host');
  }
  if (!host) return '';
  return host.split(',')[0].trim();
}
The Problem

The parsing logic simply splits on the first : and returns the first segment. There is no validation that the resulting string is a valid hostname per RFC 3986 Section 3.2.2.

RFC 3986 Section 3.2.2 defines the host component as:

host = IP-literal / IPv4address / reg-name
reg-name = *( unreserved / pct-encoded / sub-delims )
unreserved = ALPHA / DIGIT / "-" / "." / "_" / "~"
sub-delims = "!" / "$" / "&" / "'" / "(" / ")" / "*" / "+" / "," / ";" / "="

The @ character is explicitly NOT permitted in the host component - it is the delimiter separating userinfo from host in the authority component.

Attack Vector

When an attacker sends:

Host: evil.com:fake@legitimate.com:3000

Koa parses this as:

API Returns Notes
ctx.get('Host') "evil.com:fake@legitimate.com:3000" Raw header
ctx.hostname "evil.com" Attacker-controlled
ctx.host "evil.com:fake@legitimate.com:3000" Raw header value
ctx.origin "http://evil.com:fake@legitimate.com:3000" Protocol + malformed host

The ctx.hostname API returns evil.com because the parser splits on the first : without understanding that evil.com:fake@legitimate.com is a malformed authority component where evil.com:fake would be interpreted as userinfo by a proper URI parser.

Additional Concern: ctx.origin

Koa's ctx.origin property concatenates protocol and host without validation:

// lib/request.js
get origin() {
  return `${this.protocol}://${this.host}`;
}

Applications using ctx.origin for URL generation receive the full malformed Host header value, creating URLs with embedded credentials that browsers may interpret as userinfo.

HTTP/2 Consideration

Koa explicitly checks httpVersionMajor >= 2 to read the :authority pseudo-header:

if (this.req.httpVersionMajor >= 2) host = this.get(':authority');

The same vulnerability applies - malformed :authority values containing userinfo would be accepted and parsed identically.

PoC
Setup
// server.js
const Koa = require('koa'); 
const app = new Koa();

// Simulates password reset URL generation (common vulnerable pattern)
app.use(async ctx => {
  if (ctx.path === '/forgot-password') {
    const resetToken = 'abc123securtoken';
    const resetUrl = `${ctx.protocol}://${ctx.hostname}/reset?token=${resetToken}`;
    
    ctx.body = {
      message: 'Password reset link generated',
      resetUrl: resetUrl,
      debug: {
        rawHost: ctx.get('Host'),
        parsedHostname: ctx.hostname,
        origin: ctx.origin,
        protocol: ctx.protocol
      }
    };
  }
});

app.listen(3000, () => console.log('Server on http://localhost:3000'));
Exploit
curl -H "Host: evil.com:fake@localhost:3000" http://localhost:3000/forgot-password
Result
{
  "message": "Password reset link generated",
  "resetUrl": "http://evil.com/reset?token=abc123securtoken",
  "debug": {
    "rawHost": "evil.com:fake@localhost:3000",
    "parsedHostname": "evil.com",
    "origin": "http://evil.com:fake@localhost:3000",
    "protocol": "http"
  }
}

The password reset URL points to evil.com instead of the legitimate server. In a real attack:

  1. Attacker requests password reset for victim's email with malicious Host header
  2. Server generates reset link using ctx.hostnamehttps://evil.com/reset?token=SECRET
  3. Victim receives email with poisoned link
  4. Victim clicks link, token is sent to attacker's server
  5. Attacker uses token to reset victim's password
Additional Test Cases
##### Basic injection
curl -H "Host: evil.com:x@legitimate.com" http://localhost:3000/forgot-password

##### Result: hostname = "evil.com"

##### With port preservation attempt
curl -H "Host: evil.com:443@&#8203;legitimate.com:3000" http://localhost:3000/forgot-password  

##### Result: hostname = "evil.com"

##### Unicode/encoded variations
curl -H "Host: evil.com:x%40legitimate.com" http://localhost:3000/forgot-password

##### Result: hostname = "evil.com"
Deployment Consideration

For this attack to succeed in production, the malicious Host header must reach the Koa application. This occurs when:

  1. No reverse proxy - Application directly exposed to internet
  2. Misconfigured proxy - Proxy doesn't override/validate Host header
  3. Proxy trust enabled (app.proxy = true) - X-Forwarded-Host can be injected
  4. Default virtual host - Server is the catch-all for unrecognized Host headers
Impact
Vulnerability Type
  • CWE-20: Improper Input Validation
  • CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax
Attack Scenarios

1. Password Reset Poisoning (High Severity)

  • Attacker hijacks password reset tokens by poisoning reset URLs
  • Requires victim to click link in email
  • Results in account takeover

2. Email Verification Bypass

  • Attacker poisons email verification links
  • Can verify attacker-controlled email on victim accounts

3. OAuth/SSO Callback Manipulation

  • Applications using ctx.hostname for OAuth redirect URIs
  • Attacker redirects OAuth callbacks to malicious server
  • Results in token theft

4. Web Cache Poisoning

  • If responses are cached without Host in cache key
  • Poisoned URLs served to all users
  • Persistent XSS/phishing via cached responses

5. Server-Side Request Forgery (SSRF)

  • Internal routing decisions based on ctx.hostname
  • Attacker manipulates which backend receives requests
Who Is Impacted
  • Direct impact: Any Koa application using ctx.hostname or ctx.origin for URL generation without additional validation
  • Common patterns: Password reset, email verification, webhook URL generation, multi-tenant routing, OAuth implementations

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

koajs/koa (koa)

v2.16.4

Compare Source

What's Changed

v2.16.3

Compare Source

What's Changed

Full Changelog: koajs/koa@v2.16.2...v2.16.3

v2.16.2

Compare Source

What's Changed

Full Changelog: koajs/koa@v2.16.1...v2.16.2

v2.16.1

Compare Source

fix: don't render redirect values in anchor ref

v2.16.0

Compare Source

This is a backported release to fix core underlying issue with HEAD requests when using http2.createSecureServer. See discussion at #​1593 and #​1547.

  • fix missing cleanup, if response socket is no longer writeable (issue 1547) (#​1593) 399cb6b

v2.15.4

Compare Source

Full Changelog: koajs/koa@2.15.3...2.15.4

Fix: avoid redos on host and protocol getter, see GHSA-593f-38f6-jp5m

v2.15.3

Compare Source

v2.15.2

Compare Source

v2.15.1

Compare Source

v2.15.0

Compare Source

v2.14.2

Compare Source

v2.14.1

Compare Source

v2.14.0

Compare Source

v2.13.4

Compare Source

v2.13.3

Compare Source

v2.13.2

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Feb 12, 2025

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: packages/koa-server/package.json
Post-upgrade command 'npm run lintfix' has not been added to the allowed list in allowedCommands

@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 14c902f to 35bf1ba Compare March 3, 2025 12:25
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 35bf1ba to 16a743d Compare March 11, 2025 12:07
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 16a743d to c63ae12 Compare April 9, 2025 14:27
@renovate renovate Bot changed the title Update dependency koa to v2.15.4 [SECURITY] Update dependency koa to v2.16.1 [SECURITY] Apr 9, 2025
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from c63ae12 to 21c4013 Compare May 19, 2025 17:48
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 21c4013 to f08dc56 Compare July 28, 2025 22:38
@renovate renovate Bot changed the title Update dependency koa to v2.16.1 [SECURITY] Update dependency koa to v3 [SECURITY] Jul 28, 2025
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from f08dc56 to bc5278b Compare July 30, 2025 17:27
@renovate renovate Bot changed the title Update dependency koa to v3 [SECURITY] Update dependency koa to v2.16.2 [SECURITY] Jul 30, 2025
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from bc5278b to a82e0db Compare September 25, 2025 18:57
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from a82e0db to dc36511 Compare October 21, 2025 15:43
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from dc36511 to 32f4d58 Compare November 10, 2025 20:08
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 32f4d58 to 53c4491 Compare November 18, 2025 22:29
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 53c4491 to 9d3f0a3 Compare February 28, 2026 08:46
@renovate renovate Bot changed the title Update dependency koa to v2.16.2 [SECURITY] Update dependency koa to v2.16.4 [SECURITY] Feb 28, 2026
@renovate renovate Bot changed the title Update dependency koa to v2.16.4 [SECURITY] Update dependency koa to v2.16.4 [SECURITY] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/npm-koa-vulnerability branch March 27, 2026 05:28
@renovate renovate Bot changed the title Update dependency koa to v2.16.4 [SECURITY] - autoclosed Update dependency koa to v2.16.4 [SECURITY] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 9d3f0a3 to fcb8348 Compare March 30, 2026 20:30
@renovate renovate Bot changed the title Update dependency koa to v2.16.4 [SECURITY] Update dependency koa to v2.16.4 [SECURITY] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot changed the title Update dependency koa to v2.16.4 [SECURITY] - autoclosed Update dependency koa to v2.16.4 [SECURITY] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch 2 times, most recently from fcb8348 to 7f0c6e4 Compare April 27, 2026 23:07
@renovate renovate Bot force-pushed the renovate/npm-koa-vulnerability branch from 7f0c6e4 to 1b178a2 Compare April 29, 2026 14:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants