In Mosquitto before 1.4.12, pattern based ACLs can be bypassed by clients that set their username/client id to '#' or '+'. This allows locally or remotely connected clients to access MQTT topics that they do have the rights to. The same issue may be present in third party authentication/access control plugins for Mosquitto.
                
            References
                    | Link | Resource | 
|---|---|
| http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/ | Patch Vendor Advisory | 
| http://www.debian.org/security/2017/dsa-3865 | Third Party Advisory | 
| http://www.securityfocus.com/bid/98741 | Third Party Advisory VDB Entry | 
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 | Exploit Third Party Advisory | 
| http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/ | Patch Vendor Advisory | 
| http://www.debian.org/security/2017/dsa-3865 | Third Party Advisory | 
| http://www.securityfocus.com/bid/98741 | Third Party Advisory VDB Entry | 
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://mosquitto.org/2017/05/security-advisory-cve-2017-7650/ - Patch, Vendor Advisory | |
| References | () http://www.debian.org/security/2017/dsa-3865 - Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/98741 - Third Party Advisory, VDB Entry | |
| References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=516765 - Exploit, Third Party Advisory | 
Information
                Published : 2017-09-11 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-7650
Mitre link : CVE-2017-7650
CVE.ORG link : CVE-2017-7650
JSON object : View
Products Affected
                eclipse
- mosquitto
debian
- debian_linux
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
