mosquitto: Pattern based ACLs can be bypassed (CVE-2017-7650)
A vulnerability exists in Mosquitto versions 0.15 to 1.4.11.
Pattern based ACLs can be bypassed by clients that set their
username/client id to ‘#’ or ‘+’. This allows locally or remotely
connected clients to access MQTT
topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
The vulnerability only comes into effect where pattern based ACLs are in use, or potentially where third party plugins are in use.
Fixed In Version:
(from redmine: issue id 7366, created on 2017-06-01, closed on 2017-06-15)
- child #7367
- child #7368
- child #7369
- child #7370