CVE-2022-2366

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2366
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2366.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2366
Aliases
Published
2022-07-12T14:15:15Z
Modified
2024-06-06T14:00:25.002192Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

References

Affected packages

Git / github.com/mattermost/mattermost

Affected ranges

Type
GIT
Repo
https://github.com/mattermost/mattermost
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/mattermost/mattermost-server
Events

Affected versions

Other

cloud-2020-11-24
cloud-2020-12-08
cloud-2020-12-18
cloud-2021-01-12
cloud-2021-01-26
cloud-2021-02-10
cloud-2021-02-24
cloud-2021-02-25-1
cloud-2021-03-12-1
cloud-2021-03-23-1
cloud-2021-04-22-1
cloud-2021-05-05-1
cloud-2021-05-21-1
cloud-2021-06-02-1
cloud-2021-06-16-1
cloud-2021-07-01-1
cloud-2021-07-15-1
cloud-2021-07-29-1
cloud-2021-08-12-1
cloud-2021-09-29-1
cloud-2021-10-12-1
cloud-2021-10-27-1
cloud-2021-11-09-1
cloud-2021-11-11-1
cloud-2021-11-23-1
cloud-2021-11-25-1
cloud-2021-11-30-1
cloud-2021-12-08-1

v0.*

v0.5.0
v0.6.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.1
v1.3.0
v1.4.0

v2.*

v2.0.0

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.1.0
v3.2.0
v3.3.0
v3.4.0
v3.5.0
v3.5.1
v3.6.0
v3.6.1
v3.7.0
v3.7.1
v3.7.2
v3.7.3
v3.8.0

v4.*

v4.0.0
v4.0.1
v4.1.0
v4.10.0
v4.10.0-rc1
v4.10.0-rc2
v4.10.0-rc3
v4.10.0-rc4
v4.10.0-rc5
v4.2.0-rc1
v4.3.0
v4.3.0-rc1
v4.3.0-rc2
v4.3.0-rc3
v4.3.0-rc4
v4.4.0
v4.4.0-rc1
v4.4.0-rc2
v4.4.0-rc3
v4.4.0-rc4
v4.4.0-rc5
v4.5.0
v4.5.0-rc1
v4.5.0-rc2
v4.5.0-rc3
v4.5.0-rc4
v4.5.1
v4.5.1-rc1
v4.5.2
v4.5.2-rc1
v4.6.0
v4.6.0-rc1
v4.6.0-rc2
v4.6.0-rc3
v4.6.0-rc4
v4.6.0-rc5
v4.6.0-rc6
v4.7.0
v4.7.0-rc1
v4.7.0-rc2
v4.7.0-rc3
v4.7.0-rc4
v4.7.1
v4.7.1-rc1
v4.7.2
v4.7.2-rc1
v4.7.2-rc2
v4.7.2-rc3
v4.7.3
v4.7.3-rc1
v4.8.0
v4.8.0-rc1
v4.8.0-rc2
v4.8.0-rc3
v4.8.0-rc4
v4.8.0-rc5
v4.8.0-rc6
v4.9.0
v4.9.0-rc1
v4.9.0-rc2
v4.9.0-rc3
v4.9.0-rc4
v4.9.0-rc5
v4.9.0-rc6

v5.*

v5.0.0
v5.0.0-rc1
v5.0.0-rc2
v5.0.0-rc3
v5.0.0-rc4
v5.0.0-rc5
v5.0.0-rc6
v5.0.0-rc7
v5.0.1
v5.0.1-rc1
v5.1.0
v5.1.0-rc1
v5.1.0-rc2
v5.1.0-rc3
v5.1.0-rc4
v5.2.0
v5.2.0-rc1
v5.2.0-rc2
v5.2.0-rc3
v5.2.0-rc4
v5.2.0-rc5
v5.2.0-rc6
v5.2.1
v5.2.1-rc1
v5.3.0
v5.3.0-rc1
v5.3.0-rc2
v5.3.0-rc3
v5.3.0-rc4
v5.3.0-rc5
v5.3.1
v5.3.1-rc1

v6.*

v6.3.0
v6.3.1
v6.3.2
v6.3.3
v6.3.4
v6.3.5
v6.3.6
v6.3.7
v6.3.8