Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7650

Опубликовано: 11 сент. 2017
Источник: debian

Описание

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mosquittofixed1.4.10-3package

Примечания

  • http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/

  • Patches: https://mosquitto.org/files/cve/2017-7650/

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

CVSS3: 6.5
nvd
больше 8 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

CVSS3: 6.5
github
больше 3 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.