Improper Authorization Affecting aedes package, versions <0.35.1
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.13% (50th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:aedes:20180807
- published 8 Aug 2018
- disclosed 7 Aug 2018
- credit mhverbakel
Introduced: 7 Aug 2018
CVE-2018-3778 Open this link in a new tabHow to fix?
Upgrade aedes
to version 0.35.1 or higher.
Overview
aedes is a Barebone MQTT server that can run on any stream server.
Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client.
From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure).
Breaking the connection will trigger the LWT, and thus sends a message to will
, which can be seen in the other client.
References
CVSS Scores
version 3.1