Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-7650

Опубликовано: 11 сент. 2017
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*
Версия до 1.4.12 (исключая)
Конфигурация 2
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

EPSS

Процентиль: 78%
0.0111
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

CVSS3: 6.5
debian
больше 8 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clie ...

CVSS3: 6.5
github
больше 3 лет назад

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

EPSS

Процентиль: 78%
0.0111
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-287