aedes@0.32.1 vulnerabilities

Stream-based MQTT broker

Direct Vulnerabilities

Known vulnerabilities in the aedes package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

aedes is a stream-based MQTT broker.

Affected versions of this package are vulnerable to Denial of Service (DoS). lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.

How to fix Denial of Service (DoS)?

Upgrade aedes to version 0.42.1 or higher.

<0.42.1
  • M
Improper Authorization

aedes is a Barebone MQTT server that can run on any stream server.

Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client. From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure). Breaking the connection will trigger the LWT, and thus sends a message to will, which can be seen in the other client.

How to fix Improper Authorization?

Upgrade aedes to version 0.35.1 or higher.

<0.35.1
  • M
Improper Authorization

aedes is a Barebone MQTT server that can run on any stream server.

Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client. From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure). Breaking the connection will trigger the LWT, and thus sends a message to will, which can be seen in the other client.

How to fix Improper Authorization?

Upgrade aedes to version 0.35.1 or higher.

<0.35.1