[3.3] mosquitto: Pattern based ACLs can be bypassed (CVE-2017-7650)
A vulnerability exists in Mosquitto versions 0.15 to 1.4.11.
Pattern based ACLs can be bypassed by clients that set their
username/client id to ‘#’ or ‘+’. This allows locally or remotely
connected clients to access MQTT
topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
The vulnerability only comes into effect where pattern based ACLs are in use, or potentially where third party plugins are in use.
Fixed In Version:
(from redmine: issue id 7370, created on 2017-06-01, closed on 2017-06-15)
main/mosquitto: security upgrade to 1.4.12 (CVE-2017-7650) Fixes #7370