CVE-2017-7650

Publication date 11 September 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.

Status

Package Ubuntu Release Status
mosquitto 17.04 zesty
Fixed 1.4.10-2ubuntu0.1
16.10 yakkety
Fixed 1.4.8-1ubuntu0.16.10.1
16.04 LTS xenial
Fixed 1.4.8-1ubuntu0.16.04.1
14.04 LTS trusty
Fixed 0.15-2ubuntu1.1

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N