High severityNVD Advisory· Published Dec 6, 2023· Updated Aug 2, 2024
Client side path traversal due to lack of route parameters validation
CVE-2023-6458
Description
Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/mattermost/mattermost-server/v6Go | < 7.8.14 | 7.8.14 |
github.com/mattermost/mattermost/server/v8Go | < 8.1.5 | 8.1.5 |
github.com/mattermost/mattermost/server/v8Go | >= 9.0.0, < 9.0.3 | 9.0.3 |
github.com/mattermost/mattermost/serverGo | >= 9.1.0, < 9.1.2 | 9.1.2 |
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-7664-hcp7-f497ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-6458ghsaADVISORY
- mattermost.com/security-updatesghsaWEB
News mentions
0No linked articles in our index yet.