Improper Certificate Validation Affecting faye-websocket package, versions <0.11.0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-FAYEWEBSOCKET-597162
- published 2 Aug 2020
- disclosed 31 Jul 2020
- credit Unknown
Introduced: 31 Jul 2020
CVE-2020-15133 Open this link in a new tabHow to fix?
Upgrade faye-websocket
to version 0.11.0 or higher.
Overview
faye-websocket is a Standards-compliant WebSocket server and client.
Affected versions of this package are vulnerable to Improper Certificate Validation in TLS handshakes. The Faye::WebSocket::Client
class uses the EM::Connection#start_tls
method in EventMachine to implement the TLS handshake whenever a wss:
URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname.