{ "schema_version": "1.4.0", "id": "GHSA-9qcc-v828-vgx7", "modified": "2022-05-24T17:26:36Z", "published": "2022-05-24T17:26:36Z", "aliases": [ "CVE-2020-13821" ], "details": "An issue was discovered in HiveMQ Broker Control Center 4.3.2. A crafted clientid parameter in an MQTT packet (sent to the Broker) is reflected in the client section of the management console. The attacker's JavaScript is loaded in a browser, which can lead to theft of the session and cookie of the administrator's account of the Broker.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13821" }, { "type": "WEB", "url": "https://payatu.com/advisory/hivemq-mqtt-broker---xss-over-mqtt" }, { "type": "WEB", "url": "https://www.hivemq.com/blog/hivemq-4-3-3-released" }, { "type": "WEB", "url": "https://www.hivemq.com/downloads/download-hivemq" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-08-26T16:15:00Z" } }