BIT-mattermost-2022-2366

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/mattermost/BIT-mattermost-2022-2366.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-mattermost-2022-2366
Aliases
Published
2024-03-06T11:03:34.796Z
Modified
2025-04-03T14:40:37.652Z
Summary
[none]
Details

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

Database specific
{
    "cpes": [
        "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:mattermost:mattermost_server:6.7.0:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / mattermost

Package

Name
mattermost
Purl
pkg:bitnami/mattermost

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.9
Introduced
6.4.0
Fixed
6.5.2
Introduced
6.6.0
Fixed
6.6.2
Type
SEMVER
Events
Introduced
6.7.0
Last affected
6.7.0