CVE-2017-7650

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/ - Patch, Vendor Advisory () http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/ - Patch, Vendor Advisory
References () http://www.debian.org/security/2017/dsa-3865 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3865 - Third Party Advisory
References () http://www.securityfocus.com/bid/98741 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98741 - Third Party Advisory, VDB Entry
References () https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 - Exploit, Third Party Advisory () https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 - Exploit, Third Party Advisory

Information

Published : 2017-09-11 16:29

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7650

Mitre link : CVE-2017-7650

CVE.ORG link : CVE-2017-7650


JSON object : View

Products Affected

debian

  • debian_linux

eclipse

  • mosquitto
CWE
CWE-287

Improper Authentication