[3.6] mosquitto: Pattern based ACLs can be bypassed (CVE-2017-7650)
A vulnerability exists in Mosquitto versions 0.15 to 1.4.11.
Pattern based ACLs can be bypassed by clients that set their
username/client id to ‘#’ or ‘+’. This allows locally or remotely
connected clients to access MQTT
topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
The vulnerability only comes into effect where pattern based ACLs are in use, or potentially where third party plugins are in use.
Fixed In Version:
(from redmine: issue id 7367, created on 2017-06-01, closed on 2017-06-15)
- parent #7366 (closed)
- Revision 79170b17 by Natanael Copa on 2017-06-01T13:03:28Z:
main/mosquitto: security upgrade to 1.4.12 (CVE-2017-7650) fixes #7367