mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
181 lines
6.0 KiB
JSON
181 lines
6.0 KiB
JSON
{
|
|
"id": "CVE-2020-11020",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2020-04-29T18:15:13.360",
|
|
"lastModified": "2020-05-06T18:21:15.847",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Faye (NPM, RubyGem) versiones superiores a 0.5.0 y anteriores a 1.0.4, 1.1.3 y 1.2.5, presentan el potencial de omitir la autenticaci\u00f3n en el sistema de extensiones. La vulnerabilidad permite que cualquier cliente omita las comprobaciones establecidas por las extensiones del lado del servidor, al agregar segmentos adicionales al canal de mensajes. Est\u00e1 parcheado en las versiones 1.0.4, 1.1.3 y 1.2.5."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 4.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*",
|
|
"versionStartExcluding": "0.5.0",
|
|
"versionEndExcluding": "1.0.4",
|
|
"matchCriteriaId": "FDF2555F-1E11-4F39-844B-48D120586578"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*",
|
|
"versionStartExcluding": "0.5.0",
|
|
"versionEndExcluding": "1.0.4",
|
|
"matchCriteriaId": "F2DB6AE8-AB9B-4A1A-9A23-80A45A3C7FD3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*",
|
|
"versionStartIncluding": "1.1.0",
|
|
"versionEndExcluding": "1.1.3",
|
|
"matchCriteriaId": "4C2E7A43-4236-43CC-8588-DFF7DE651276"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*",
|
|
"versionStartIncluding": "1.1.0",
|
|
"versionEndExcluding": "1.1.3",
|
|
"matchCriteriaId": "C62CA8E2-99F2-4A49-8726-1D1F5EB3F148"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*",
|
|
"versionStartIncluding": "1.2.0",
|
|
"versionEndExcluding": "1.2.5",
|
|
"matchCriteriaId": "A7AECEFE-3AC9-4855-BD8F-9019A6B64541"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*",
|
|
"versionStartIncluding": "1.2.0",
|
|
"versionEndExcluding": "1.2.5",
|
|
"matchCriteriaId": "4005E717-555C-4AEB-9D1B-5400C26F2764"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |