Description
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
Remediation
References
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5
Related Vulnerabilities
CVE-2023-43497 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-25855 Vulnerability in npm package create-choo-app3
CVE-2022-41927 Vulnerability in maven package org.xwiki.platform:xwiki-platform-tag-ui
CVE-2018-20677 Vulnerability in maven package org.webjars.bowergithub.twbs:bootstrap-sass
CVE-2022-41340 Vulnerability in npm package @lionello/secp256k1-js