An issue was discovered in HiveMQ Broker Control Center 4.3.2. A crafted clientid parameter in an MQTT packet (sent to the Broker) is reflected in the client section of the management console. The attacker's JavaScript is loaded in a browser, which can lead to theft of the session and cookie of the administrator's account of the Broker.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt | third party advisory |
https://www.hivemq.com/blog/hivemq-4-3-3-released/ | release notes vendor advisory |