First published: Fri Jul 31 2020(Updated: )
Faye faye-websocket is vulnerable to a man-in-the-middle attack, caused by the lack of certification validation in TLS handshakes. An attacker could exploit this vulnerability to launch a man-in-the-middle attack and gain access to the communication channel between endpoints to obtain sensitive information or further compromise the system.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Faye-websocket Project Faye-websocket | <0.11.0 | |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15133 is a vulnerability in faye-websocket that allows for man-in-the-middle attacks due to the lack of certification validation in TLS handshakes.
CVE-2020-15133 has a severity rating of 8.7 (high).
The Faye-websocket project's faye-websocket version up to and exclusive of 0.11.0 is affected by CVE-2020-15133. Additionally, IBM Security Verify Governance version up to and inclusive of 10.0 is also affected.
CVE-2020-15133 occurs when the Faye::WebSocket::Client class in faye-websocket uses the EM::Connection#start_tls method in EventMachine to implement the TLS handshake, but lacks certification validation, making it vulnerable to man-in-the-middle attacks.
Yes, updating to version 0.11.0 or higher of faye-websocket resolves the vulnerability.