Moderate severityNVD Advisory· Published Sep 29, 2023· Updated Sep 20, 2024
DoS via Channel Notification Properties
CVE-2023-5196
Description
Mattermost fails to enforce character limits in all possible notification props allowing an attacker to send a really long value for a notification_prop resulting in the server consuming an abnormal quantity of computing resources and possibly becoming temporarily unavailable for its users.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost/server/v8Go | >= 8.1.0, < 8.1.1 | 8.1.1 |
github.com/mattermost/mattermost/server/v8Go | >= 8.0.0, < 8.0.2 | 8.0.2 |
github.com/mattermost/mattermost-server/v6Go | < 7.8.10 | 7.8.10 |
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-33r7-wjfc-7w98ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-5196ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.