faye@0.8.1 vulnerabilities

Simple pub/sub messaging for the web

Direct Vulnerabilities

Known vulnerabilities in the faye package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Certificate Validation

faye is a simple pub/sub messaging for the web.

Affected versions of this package are vulnerable to Improper Certificate Validation due to not implementing certificate verification by default, meaning that it does not check whether the server presents a valid and trusted TLS certificate for the expected hostname.

How to fix Improper Certificate Validation?

Upgrade faye to version 1.4.0 or higher.

<1.4.0
  • H
Improper Access Control

faye is a simple pub/sub messaging for the web.

Affected versions of this package are vulnerable to Improper Access Control. The Server parses channels in a way that means any channel namespaced under /meta/subscribe will also work as a subscription request. For example if the client sends a message to the channel /meta/subscribe/x, that will bypass most authentication extensions but will still be interpreted by the server as a subscription request, and the client will be subscribed to the requested channel. The client has thus bypassed the user's access control policy.

How to fix Improper Access Control?

Upgrade faye to version 1.0.4, 1.1.3, 1.2.5 or higher.

<1.0.4 >=1.1.0 <1.1.3 >=1.2.0 <1.2.5
  • H
Cross-Site Request Forgery (CSRF)

faye is a simple pub/sub messaging for the web.

Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). Rosetta Flash (alphanum only swf converter) can be used as a callback at a JSONP endpoint, and as a result, send data across domains.

How to fix Cross-Site Request Forgery (CSRF)?

Upgrade faye to version 1.1.0 or higher.

<1.1.0
  • M
Insecure Defaults

faye is a simple pub/sub messaging for the web. Affected versions of the package are vulnerable to Man-In-The-Middle attacks due to insecure defaults. By default, faye used an insecure cipher, allowing attackers to gain access to SSL encrypted packets. This attack is also known as the BEAST attack.

You can read more about insecure defaults on our blog

How to fix Insecure Defaults?

Upgrade faye to version 0.8.9 or higher.

>=0.5.0 <0.8.9