ALT-PU-2018-1086-1
Closed vulnerabilities
Published: 2017-09-11
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2017-7650
In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
Severity: MEDIUM (4.0)
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Severity: MEDIUM (6.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References:
- http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/
- http://www.debian.org/security/2017/dsa-3865
- http://www.securityfocus.com/bid/98741
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765
- http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/
- http://www.debian.org/security/2017/dsa-3865
- http://www.securityfocus.com/bid/98741
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765
Published: 2017-06-25
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2017-9868
In Mosquitto through 1.4.12, mosquitto.db (aka the persistence file) is world readable, which allows local users to obtain sensitive MQTT topic information.
Severity: LOW (2.1)
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Severity: MEDIUM (5.5)
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
References: