7.5
CVSSv2

CVE-2020-11020

Published: 29/04/2020 Updated: 06/05/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Faye (NPM, RubyGem) versions greater than 0.5.0 and prior to 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

faye project faye

Vendor Advisories

Debian Bug report logs - #959392 ruby-faye: CVE-2020-11020 Package: src:ruby-faye; Maintainer for src:ruby-faye is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 1 May 2020 20:21:04 UTC Severity: grave Tags: secur ...