faye@1.2.0 vulnerabilities

Simple pub/sub messaging for the web

Direct Vulnerabilities

Known vulnerabilities in the faye package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Improper Certificate Validation

faye is a simple pub/sub messaging for the web.

Affected versions of this package are vulnerable to Improper Certificate Validation due to not implementing certificate verification by default, meaning that it does not check whether the server presents a valid and trusted TLS certificate for the expected hostname.

How to fix Improper Certificate Validation?

Upgrade faye to version 1.4.0 or higher.

<1.4.0
  • H
Improper Access Control

faye is a simple pub/sub messaging for the web.

Affected versions of this package are vulnerable to Improper Access Control. The Server parses channels in a way that means any channel namespaced under /meta/subscribe will also work as a subscription request. For example if the client sends a message to the channel /meta/subscribe/x, that will bypass most authentication extensions but will still be interpreted by the server as a subscription request, and the client will be subscribed to the requested channel. The client has thus bypassed the user's access control policy.

How to fix Improper Access Control?

Upgrade faye to version 1.0.4, 1.1.3, 1.2.5 or higher.

<1.0.4 >=1.1.0 <1.1.3 >=1.2.0 <1.2.5