Description
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
Published: 2020-04-29
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0392 Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
Github GHSA Github GHSA GHSA-qpg4-4w7w-2mq5 Authentication and extension bypass in Faye
History

No history.

Subscriptions

Faye Project Faye
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T11:21:14.232Z

Reserved: 2020-03-30T00:00:00.000Z

Link: CVE-2020-11020

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-29T18:15:13.360

Modified: 2024-11-21T04:56:35.843

Link: CVE-2020-11020

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses