Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11020
HistoryApr 29, 2020 - 5:35 p.m.

CVE-2020-11020 Authentication and extension bypass in Faye

2020-04-2917:35:12
CWE-287
GitHub_M
www.cve.org

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

9.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.4%

Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.

CNA Affected

[
  {
    "product": "Faye",
    "vendor": "faye",
    "versions": [
      {
        "status": "affected",
        "version": ">= 0.5.0, < 1.0.4"
      },
      {
        "status": "affected",
        "version": ">= 1.1.0, < 1.1.3"
      },
      {
        "status": "affected",
        "version": ">= 1.2.0, < 1.2.5"
      }
    ]
  }
]

8.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

9.7 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.4%