CVE-2020-13821

An issue was discovered in HiveMQ Broker Control Center 4.3.2. A crafted clientid parameter in an MQTT packet (sent to the Broker) is reflected in the client section of the management console. The attacker's JavaScript is loaded in a browser, which can lead to theft of the session and cookie of the administrator's account of the Broker.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hivemq:broker_control_center:4.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt - Third Party Advisory () https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt - Third Party Advisory
References () https://www.hivemq.com/blog/hivemq-4-3-3-released/ - Release Notes, Vendor Advisory () https://www.hivemq.com/blog/hivemq-4-3-3-released/ - Release Notes, Vendor Advisory

Information

Published : 2020-08-26 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13821

Mitre link : CVE-2020-13821

CVE.ORG link : CVE-2020-13821


JSON object : View

Products Affected

hivemq

  • broker_control_center
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')