Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
References
Link | Resource |
---|---|
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e | Patch Third Party Advisory |
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5 | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-04-29 11:15
Updated : 2020-05-06 11:21
NVD link : CVE-2020-11020
Mitre link : CVE-2020-11020
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
faye_project
- faye