Description
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
Remediation
References
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5
Related Vulnerabilities
CVE-2021-28099 Vulnerability in maven package com.netflix.hollow:hollow
CVE-2023-37958 Vulnerability in maven package org.jenkins-ci.plugins:sumologic-publisher
CVE-2021-32860 Vulnerability in maven package org.webjars.npm:izimodal
CVE-2023-30516 Vulnerability in maven package org.jenkins-ci.plugins:image-tag-parameter
CVE-2022-31183 Vulnerability in maven package co.fs2:fs2-io_sjs1_2.13