Description
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
Remediation
References
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5
Related Vulnerabilities
CVE-2023-49620 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-dao
CVE-2021-4305 Vulnerability in npm package robots-txt-guard
CVE-2023-25157 Vulnerability in maven package org.geoserver.community:gs-jdbcconfig
CVE-2021-29620 Vulnerability in maven package com.epam.reportportal:service-api
CVE-2022-45136 Vulnerability in maven package org.apache.jena:jena-sdb