When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use a password file for authentication, any malformed data in the password file will be treated as valid. This typically means that the malformed data becomes a username and no password. If this occurs, clients can circumvent authentication and get access to the broker by using the malformed username. In particular, a blank line will be treated as a valid empty username. Other security measures are unaffected. Users who have only used the mosquitto_passwd utility to create and modify their password files are unaffected by this vulnerability.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libmosquitto-dev",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "libmosquitto1",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "libmosquittopp-dev",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "libmosquittopp1",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "mosquitto",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "mosquitto-clients",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
},
{
"binary_name": "mosquitto-dev",
"binary_version": "1.4.8-1ubuntu0.16.04.5"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libmosquitto-dev",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "libmosquitto1",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "libmosquittopp-dev",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "libmosquittopp1",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "mosquitto",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "mosquitto-clients",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
},
{
"binary_name": "mosquitto-dev",
"binary_version": "1.4.15-2ubuntu0.18.04.1"
}
]
}