Access Restriction Bypass Affecting mosquitto Open this link in a new tab package, versions >=0.0.0


0.0
medium
  • Attack Complexity

    Low

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-COCOAPODS-MOSQUITTO-471317

  • published

    2 Oct 2019

  • disclosed

    26 May 2017

  • credit

    Artem Zinenko

How to fix?

There is no fixed version for Mosquitto.

Overview

Mosquitto is an open source implementation of a server for version 3.1 and 3.1.1 of the MQTT protocol.

Affected versions of this package are vulnerable to Access Restriction Bypass. It does not perform ACL check for the clients with client_id or username including symbols (# or +) when pattern based ACLs is used.