Bitnami package
mattermost
pkg:bitnami/mattermost
Vulnerabilities (104)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-27266 | — | >= 5.12.0, < 7.7.0 | 7.7.0 | Feb 27, 2023 | Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the /api/v4/users/me/teams API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response. | ||
| CVE-2023-27265 | — | >= 5.12.0, < 7.7.0 | 7.7.0 | Feb 27, 2023 | Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the "Regenerate Invite Id" API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response. | ||
| CVE-2022-3257 | — | < 7.2.0 | 7.2.0 | Sep 23, 2022 | Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service. | ||
| CVE-2022-3147 | — | < 7.1.0 | 7.1.0 | Sep 9, 2022 | Mattermost version 7.0.x and earlier fails to sufficiently limit the in-memory sizes of concurrently uploaded JPEG images, which allows authenticated users to cause resource exhaustion on specific system configurations, resulting in server-side Denial of Service. | ||
| CVE-2022-2401 | — | < 6.3.9 | 6.3.9 | Jul 14, 2022 | Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs. | ||
| CVE-2022-2366 | — | < 6.3.9 | 6.3.9 | Jul 11, 2022 | Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers. | ||
| CVE-2022-1982 | — | >= 5.0.0, < 6.3.8 | 6.3.8 | Jun 2, 2022 | Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post. | ||
| CVE-2022-1384 | — | < 6.5.0 | 6.5.0 | Apr 19, 2022 | Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabi | ||
| CVE-2022-1385 | — | < 6.5.0 | 6.5.0 | Apr 19, 2022 | Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels. | ||
| CVE-2022-1332 | — | >= 5.37.0, < 5.37.9 | 5.37.9 | Apr 13, 2022 | One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents. | ||
| CVE-2022-1337 | — | >= 5.37.0, < 5.37.9 | 5.37.9 | Apr 13, 2022 | The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files. | ||
| CVE-2022-0904 | — | >= 5.0.0, < 5.37.8 | 5.37.8 | Mar 9, 2022 | A stack overflow bug in the document extractor in Mattermost Server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted Apple Pages document. | ||
| CVE-2022-0903 | — | < 5.37.8 | 5.37.8 | Mar 9, 2022 | A call stack overflow bug in the SAML login feature in Mattermost server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted POST body. | ||
| CVE-2021-37863 | — | < 6.0.1 | 6.0.1 | Dec 17, 2021 | Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post. | ||
| CVE-2021-37862 | — | < 6.0.1 | 6.0.1 | Dec 17, 2021 | Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token. | ||
| CVE-2020-14460 | — | < 5.9.8 | 5.9.8 | Jun 19, 2020 | An issue was discovered in Mattermost Server before 5.19.0, 5.18.1, 5.17.3, 5.16.5, and 5.9.8. Creation of a trusted OAuth application does not always require admin privileges, aka MMSA-2020-0001. | ||
| CVE-2020-14459 | — | < 5.19.0 | 5.19.0 | Jun 19, 2020 | An issue was discovered in Mattermost Server before 5.19.0. Attackers can rename a channel and cause a collision with a direct message, aka MMSA-2020-0002. | ||
| CVE-2020-14458 | — | < 5.19.0 | 5.19.0 | Jun 19, 2020 | An issue was discovered in Mattermost Server before 5.19.0. Attackers can discover private channels via the "get channel by name" API, aka MMSA-2020-0004. | ||
| CVE-2020-14457 | — | < 5.20.0 | 5.20.0 | Jun 19, 2020 | An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the update_team WebSocket event, aka MMSA-2020-0012. | ||
| CVE-2020-14453 | — | < 5.21.0 | 5.21.0 | Jun 19, 2020 | An issue was discovered in Mattermost Server before 5.21.0. Socket read operations are not appropriately restricted, which allows attackers to cause a denial of service, aka MMSA-2020-0005. |
- CVE-2023-27266Feb 27, 2023affected >= 5.12.0, < 7.7.0fixed 7.7.0
Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the /api/v4/users/me/teams API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response.
- CVE-2023-27265Feb 27, 2023affected >= 5.12.0, < 7.7.0fixed 7.7.0
Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the "Regenerate Invite Id" API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response.
- CVE-2022-3257Sep 23, 2022affected < 7.2.0fixed 7.2.0
Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.
- CVE-2022-3147Sep 9, 2022affected < 7.1.0fixed 7.1.0
Mattermost version 7.0.x and earlier fails to sufficiently limit the in-memory sizes of concurrently uploaded JPEG images, which allows authenticated users to cause resource exhaustion on specific system configurations, resulting in server-side Denial of Service.
- CVE-2022-2401Jul 14, 2022affected < 6.3.9fixed 6.3.9
Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs.
- CVE-2022-2366Jul 11, 2022affected < 6.3.9fixed 6.3.9
Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
- CVE-2022-1982Jun 2, 2022affected >= 5.0.0, < 6.3.8fixed 6.3.8
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.
- CVE-2022-1384Apr 19, 2022affected < 6.5.0fixed 6.5.0
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabi
- CVE-2022-1385Apr 19, 2022affected < 6.5.0fixed 6.5.0
Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels.
- CVE-2022-1332Apr 13, 2022affected >= 5.37.0, < 5.37.9fixed 5.37.9
One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents.
- CVE-2022-1337Apr 13, 2022affected >= 5.37.0, < 5.37.9fixed 5.37.9
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.
- CVE-2022-0904Mar 9, 2022affected >= 5.0.0, < 5.37.8fixed 5.37.8
A stack overflow bug in the document extractor in Mattermost Server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted Apple Pages document.
- CVE-2022-0903Mar 9, 2022affected < 5.37.8fixed 5.37.8
A call stack overflow bug in the SAML login feature in Mattermost server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted POST body.
- CVE-2021-37863Dec 17, 2021affected < 6.0.1fixed 6.0.1
Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post.
- CVE-2021-37862Dec 17, 2021affected < 6.0.1fixed 6.0.1
Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.
- CVE-2020-14460Jun 19, 2020affected < 5.9.8fixed 5.9.8
An issue was discovered in Mattermost Server before 5.19.0, 5.18.1, 5.17.3, 5.16.5, and 5.9.8. Creation of a trusted OAuth application does not always require admin privileges, aka MMSA-2020-0001.
- CVE-2020-14459Jun 19, 2020affected < 5.19.0fixed 5.19.0
An issue was discovered in Mattermost Server before 5.19.0. Attackers can rename a channel and cause a collision with a direct message, aka MMSA-2020-0002.
- CVE-2020-14458Jun 19, 2020affected < 5.19.0fixed 5.19.0
An issue was discovered in Mattermost Server before 5.19.0. Attackers can discover private channels via the "get channel by name" API, aka MMSA-2020-0004.
- CVE-2020-14457Jun 19, 2020affected < 5.20.0fixed 5.20.0
An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the update_team WebSocket event, aka MMSA-2020-0012.
- CVE-2020-14453Jun 19, 2020affected < 5.21.0fixed 5.21.0
An issue was discovered in Mattermost Server before 5.21.0. Socket read operations are not appropriately restricted, which allows attackers to cause a denial of service, aka MMSA-2020-0005.
Page 5 of 6