Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
References
Link | Resource |
---|---|
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e | Patch Third Party Advisory |
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5 | Exploit Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-04-29T17:35:12
Updated: 2020-04-29T17:35:12
Reserved: 2020-03-30T00:00:00
Link: CVE-2020-11020
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-29T18:15:13.360
Modified: 2020-05-06T18:21:15.847
Link: CVE-2020-11020
JSON object: View
Redhat Information
No data.
CWE