faye@0.8.8 vulnerabilities

Simple pub/sub messaging for the web

  • latest version

    1.4.1

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    4 months ago

  • licenses detected

    • >=0.5.0 <1.3.0
  • Direct Vulnerabilities

    Known vulnerabilities in the faye package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Certificate Validation

    faye is a simple pub/sub messaging for the web.

    Affected versions of this package are vulnerable to Improper Certificate Validation due to not implementing certificate verification by default, meaning that it does not check whether the server presents a valid and trusted TLS certificate for the expected hostname.

    How to fix Improper Certificate Validation?

    Upgrade faye to version 1.4.0 or higher.

    <1.4.0
    • H
    Improper Access Control

    faye is a simple pub/sub messaging for the web.

    Affected versions of this package are vulnerable to Improper Access Control. The Server parses channels in a way that means any channel namespaced under /meta/subscribe will also work as a subscription request. For example if the client sends a message to the channel /meta/subscribe/x, that will bypass most authentication extensions but will still be interpreted by the server as a subscription request, and the client will be subscribed to the requested channel. The client has thus bypassed the user's access control policy.

    How to fix Improper Access Control?

    Upgrade faye to version 1.0.4, 1.1.3, 1.2.5 or higher.

    <1.0.4>=1.1.0 <1.1.3>=1.2.0 <1.2.5
    • H
    Cross-Site Request Forgery (CSRF)

    faye is a simple pub/sub messaging for the web.

    Affected versions of this package are vulnerable to Cross-Site Request Forgery (CSRF). Rosetta Flash (alphanum only swf converter) can be used as a callback at a JSONP endpoint, and as a result, send data across domains.

    How to fix Cross-Site Request Forgery (CSRF)?

    Upgrade faye to version 1.1.0 or higher.

    <1.1.0
    • M
    Insecure Defaults

    faye is a simple pub/sub messaging for the web. Affected versions of the package are vulnerable to Man-In-The-Middle attacks due to insecure defaults. By default, faye used an insecure cipher, allowing attackers to gain access to SSL encrypted packets. This attack is also known as the BEAST attack.

    You can read more about insecure defaults on our blog

    How to fix Insecure Defaults?

    Upgrade faye to version 0.8.9 or higher.

    >=0.5.0 <0.8.9