When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=543401 | Exploit Issue Tracking Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html | |
| https://bugs.eclipse.org/bugs/show_bug.cgi?id=543401 | Exploit Issue Tracking Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html | 
Configurations
                    History
                    21 Nov 2024, 03:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugs.eclipse.org/bugs/show_bug.cgi?id=543401 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2019/10/msg00035.html - | 
Information
                Published : 2019-03-27 18:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12551
Mitre link : CVE-2018-12551
CVE.ORG link : CVE-2018-12551
JSON object : View
Products Affected
                eclipse
- mosquitto
