Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. pusher/pusher-php-server
  4. ›
  5. GHSA-7v7m-pcw5-h3cg

GHSA-7v7m-pcw5-h3cg: Pusher Service Channel Authentication Bypass

May 20, 2024

The service offered by Pusher provides “private” channels with an authentication mechanism that restricts subscription access. The decision on allowing subscriptions to private channels is delegated to customers, who implement an authentication endpoint. End-users request a token from this endpoint to join a specific channel. The token is an HMAC signature of the end-user’s connection ID (socket_id) and the desired channel.

The issue arises from a lack of validation in the libraries provided to customers. This vulnerability allows a malicious end-user to submit a malformed socket_id field, leading the customer to unknowingly sign a string. This signed string grants access to a different private channel than the one the end-user is ostensibly requesting. Consequently, a malicious end-user, with permission to subscribe to one private channel, can forge permission for any private channel owned by the same customer.

Additionally, the HTTP API is secured by requiring a signature with each request, generated by the customer’s secret key. In specific cases, a malicious end-user may deceive a customer into signing a value for socket_id, effectively authenticating an API request to Pusher.

References

  • blog.pusher.com/update-on-security
  • github.com/FriendsOfPHP/security-advisories/blob/master/pusher/pusher-php-server/2015-05-13.yaml
  • github.com/advisories/GHSA-7v7m-pcw5-h3cg
  • github.com/pusher/pusher-http-php
  • github.com/pusher/pusher-http-php/commit/5a2ccdd3b14932b9cb5d0f59cf81d19c447214f1

Code Behaviors & Features

Detect and mitigate GHSA-7v7m-pcw5-h3cg with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.2.1

Fixed versions

  • 2.2.1

Solution

Upgrade to version 2.2.1 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Source file

packagist/pusher/pusher-php-server/GHSA-7v7m-pcw5-h3cg.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:36 +0000.