aedes@0.13.0 vulnerabilities

Stream-based MQTT broker

  • latest version

    0.51.3

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the aedes package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    aedes is a stream-based MQTT broker.

    Affected versions of this package are vulnerable to Denial of Service (DoS). lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.

    How to fix Denial of Service (DoS)?

    Upgrade aedes to version 0.42.1 or higher.

    <0.42.1
    • M
    Improper Authorization

    aedes is a Barebone MQTT server that can run on any stream server.

    Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client. From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure). Breaking the connection will trigger the LWT, and thus sends a message to will, which can be seen in the other client.

    How to fix Improper Authorization?

    Upgrade aedes to version 0.35.1 or higher.

    <0.35.1