When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.
References
Link | Resource |
---|---|
https://bugs.eclipse.org/bugs/show_bug.cgi?id=543401 | Exploit Issue Tracking Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: eclipse
Published: 2019-03-27T17:26:20
Updated: 2019-10-26T23:06:13
Reserved: 2018-06-18T00:00:00
Link: CVE-2018-12551
JSON object: View
NVD Information
Status : Modified
Published: 2019-03-27T18:29:00.367
Modified: 2019-10-09T23:34:04.137
Link: CVE-2018-12551
JSON object: View
Redhat Information
No data.