aedes@0.2.0 vulnerabilities

Stream-based MQTT broker

  • latest version

    0.51.3

  • first published

    9 years ago

  • latest version published

    3 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the aedes package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Denial of Service (DoS)

    aedes is a stream-based MQTT broker.

    Affected versions of this package are vulnerable to Denial of Service (DoS) through a crafted request. An attacker can disrupt service availability.

    How to fix Denial of Service (DoS)?

    There is no fixed version for aedes.

    *
    • H
    Denial of Service (DoS)

    aedes is a stream-based MQTT broker.

    Affected versions of this package are vulnerable to Denial of Service (DoS). lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.

    How to fix Denial of Service (DoS)?

    Upgrade aedes to version 0.42.1 or higher.

    <0.42.1
    • M
    Improper Authorization

    aedes is a Barebone MQTT server that can run on any stream server.

    Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client. From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure). Breaking the connection will trigger the LWT, and thus sends a message to will, which can be seen in the other client.

    How to fix Improper Authorization?

    Upgrade aedes to version 0.35.1 or higher.

    <0.35.1