Description
When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1972-1 | mosquitto security update |
Debian DSA |
DSA-4388-1 | mosquitto security update |
EUVD |
EUVD-2018-4511 | When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2024-08-05T08:38:06.296Z
Reserved: 2018-06-18T00:00:00.000Z
Link: CVE-2018-12551
No data.
Status : Modified
Published: 2019-03-27T18:29:00.367
Modified: 2024-11-21T03:45:25.547
Link: CVE-2018-12551
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD