{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:24:31.773","vulnerabilities":[{"cve":{"id":"CVE-2020-11020","sourceIdentifier":"security-advisories@github.com","published":"2020-04-29T18:15:13.360","lastModified":"2024-11-21T04:56:35.843","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5."},{"lang":"es","value":"Faye (NPM, RubyGem) versiones superiores a 0.5.0 y anteriores a 1.0.4, 1.1.3 y 1.2.5, presentan el potencial de omitir la autenticación en el sistema de extensiones. La vulnerabilidad permite que cualquier cliente omita las comprobaciones establecidas por las extensiones del lado del servidor, al agregar segmentos adicionales al canal de mensajes. Está parcheado en las versiones 1.0.4, 1.1.3 y 1.2.5."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*","versionStartExcluding":"0.5.0","versionEndExcluding":"1.0.4","matchCriteriaId":"FDF2555F-1E11-4F39-844B-48D120586578"},{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*","versionStartExcluding":"0.5.0","versionEndExcluding":"1.0.4","matchCriteriaId":"F2DB6AE8-AB9B-4A1A-9A23-80A45A3C7FD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.1.0","versionEndExcluding":"1.1.3","matchCriteriaId":"4C2E7A43-4236-43CC-8588-DFF7DE651276"},{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*","versionStartIncluding":"1.1.0","versionEndExcluding":"1.1.3","matchCriteriaId":"C62CA8E2-99F2-4A49-8726-1D1F5EB3F148"},{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"1.2.5","matchCriteriaId":"A7AECEFE-3AC9-4855-BD8F-9019A6B64541"},{"vulnerable":true,"criteria":"cpe:2.3:a:faye_project:faye:*:*:*:*:*:ruby:*:*","versionStartIncluding":"1.2.0","versionEndExcluding":"1.2.5","matchCriteriaId":"4005E717-555C-4AEB-9D1B-5400C26F2764"}]}]}],"references":[{"url":"https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory"]}]}}]}