Improper Authorization Affecting aedes package, versions <0.35.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.13% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:aedes:20180807
  • published8 Aug 2018
  • disclosed7 Aug 2018
  • creditmhverbakel

Introduced: 7 Aug 2018

CVE-2018-3778  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade aedes to version 0.35.1 or higher.

Overview

aedes is a Barebone MQTT server that can run on any stream server.

Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client. From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure). Breaking the connection will trigger the LWT, and thus sends a message to will, which can be seen in the other client.

CVSS Scores

version 3.1