
Research
/Security News
Popular Tinycolor npm Package Compromised in Supply Chain Attack Affecting 40+ Packages
Malicious update to @ctrl/tinycolor on npm is part of a supply-chain attack hitting 40+ packages across maintainers
host-validation-middleware
Advanced tools
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
[!NOTE] DNS rebinding attacks are not effective against HTTPS sites. Since HTTPS is now commonly used for production environments, this middleware is generally unnecessary for production sites.
npm i -D host-validation-middleware # pnpm add -D host-validation-middleware
hostValidationMiddleware
This middleware is compatible with Connect and frameworks like Express that support Connect-style middleware.
import connect from 'connect'
import { hostValidationMiddleware } from 'host-validation-middleware'
const app = connect()
app.use(
hostValidationMiddleware({
// Values starting with `.` will allow all the subdomains under that domain
allowedHosts: ['example.com', '.mydomain.com'],
// Optionally customize the error message:
generateErrorMessage: hostname => `Access denied for host: ${hostname}`,
// Optionally set the error response content type:
errorResponseContentType: 'text/plain'
})
)
app.use((req, res) => {
res.end('Hello, world!')
})
app.listen(3000, () => {
console.log('Server running on http://localhost:3000')
})
isHostAllowed
You can also use the core host validation logic directly:
import { isHostAllowed } from 'host-validation-middleware'
const allowedHosts = ['example.com', '.mydomain.com']
console.log(isHostAllowed('example.com', allowedHosts)) // true
console.log(isHostAllowed('sub.mydomain.com', allowedHosts)) // true
console.log(isHostAllowed('evil.com', allowedHosts)) // false
The host names listed in the allowedHosts
options will be allowed.
If the host name starts with a dot, the domain without the dot and any subdomain of it will be allowed.
allowedHosts: ['example.com', '.mydomain.com']
:
example.com
are allowed.mydomain.com
, foo.mydomain.com
, bar.foo.mydomain.com
are also allowed.Also the following hosts that cannot be used for DNS rebinding attacks are always allowed:
localhost
or subdomain of localhost
(e.g., localhost
, foo.localhost
)127.0.0.1
, [::1]
)file:
or browser extension protocolFAQs
Middleware for validating host headers in requests to protect against DNS rebinding attacks.
The npm package host-validation-middleware receives a total of 5,409 weekly downloads. As such, host-validation-middleware popularity was classified as popular.
We found that host-validation-middleware demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Malicious update to @ctrl/tinycolor on npm is part of a supply-chain attack hitting 40+ packages across maintainers
Security News
pnpm's new minimumReleaseAge setting delays package updates to prevent supply chain attacks, with other tools like Taze and NCU following suit.
Security News
The Rust Security Response WG is warning of phishing emails from rustfoundation.dev targeting crates.io users.