Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11020

Опубликовано: 29 апр. 2020
Источник: debian
EPSS Низкий

Описание

Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-fayefixed1.4.0-1package
ruby-fayeno-dsabusterpackage

Примечания

  • https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5

  • https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e

EPSS

Процентиль: 58%
0.00365
Низкий

Связанные уязвимости

CVSS3: 8.5
ubuntu
почти 6 лет назад

Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.

CVSS3: 8.5
nvd
почти 6 лет назад

Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.

CVSS3: 8.5
github
почти 6 лет назад

Authentication and extension bypass in Faye

EPSS

Процентиль: 58%
0.00365
Низкий