Description
In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-961-1 | mosquitto security update |
Debian DSA |
DSA-3865-1 | mosquitto security update |
EUVD |
EUVD-2017-16655 | In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto. |
References
History
No history.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-09-16T20:43:01.173Z
Reserved: 2017-04-11T00:00:00.000Z
Link: CVE-2017-7650
No data.
Status : Modified
Published: 2017-09-11T16:29:00.260
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-7650
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD