CVE-2022-2366

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-2366
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2366.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-2366
Aliases
Published
2022-07-12T14:15:15.743Z
Modified
2025-11-20T12:03:19.218748Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

References

Affected packages

Git / github.com/mattermost/mattermost

Affected ranges

Type
GIT
Repo
https://github.com/mattermost/mattermost
Events

Git / github.com/mattermost/mattermost-server

Affected ranges

Type
GIT
Repo
https://github.com/mattermost/mattermost-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

cloud-2020-11-24
cloud-2020-12-08
cloud-2020-12-18
cloud-2021-01-12
cloud-2021-01-26
cloud-2021-02-10
cloud-2021-02-24
cloud-2021-02-25-1
cloud-2021-03-12-1
cloud-2021-03-23-1
cloud-2021-04-22-1
cloud-2021-05-05-1
cloud-2021-05-21-1
cloud-2021-06-02-1
cloud-2021-06-16-1
cloud-2021-07-01-1
cloud-2021-07-15-1
cloud-2021-07-29-1
cloud-2021-08-12-1
cloud-2021-09-29-1
cloud-2021-10-12-1
cloud-2021-10-27-1
cloud-2021-11-09-1
cloud-2021-11-11-1
cloud-2021-11-23-1
cloud-2021-11-25-1
cloud-2021-11-30-1
cloud-2021-12-08-1

v0.*

v0.5.0
v0.6.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.1
v1.3.0
v1.4.0

v2.*

v2.0.0

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.1.0
v3.2.0
v3.3.0
v3.4.0
v3.5.0
v3.5.1
v3.6.0
v3.6.1
v3.7.0
v3.7.1
v3.7.2
v3.7.3
v3.8.0

v4.*

v4.0.0
v4.0.1
v4.1.0
v4.10.0
v4.10.0-rc1
v4.10.0-rc2
v4.10.0-rc3
v4.10.0-rc4
v4.10.0-rc5
v4.2.0-rc1
v4.3.0
v4.3.0-rc1
v4.3.0-rc2
v4.3.0-rc3
v4.3.0-rc4
v4.4.0
v4.4.0-rc1
v4.4.0-rc2
v4.4.0-rc3
v4.4.0-rc4
v4.4.0-rc5
v4.5.0
v4.5.0-rc1
v4.5.0-rc2
v4.5.0-rc3
v4.5.0-rc4
v4.5.1
v4.5.1-rc1
v4.5.2
v4.5.2-rc1
v4.6.0
v4.6.0-rc1
v4.6.0-rc2
v4.6.0-rc3
v4.6.0-rc4
v4.6.0-rc5
v4.6.0-rc6
v4.7.0
v4.7.0-rc1
v4.7.0-rc2
v4.7.0-rc3
v4.7.0-rc4
v4.7.1
v4.7.1-rc1
v4.7.2
v4.7.2-rc1
v4.7.2-rc2
v4.7.2-rc3
v4.7.3
v4.7.3-rc1
v4.8.0
v4.8.0-rc1
v4.8.0-rc2
v4.8.0-rc3
v4.8.0-rc4
v4.8.0-rc5
v4.8.0-rc6
v4.9.0
v4.9.0-rc1
v4.9.0-rc2
v4.9.0-rc3
v4.9.0-rc4
v4.9.0-rc5
v4.9.0-rc6

v5.*

v5.0.0
v5.0.0-rc1
v5.0.0-rc2
v5.0.0-rc3
v5.0.0-rc4
v5.0.0-rc5
v5.0.0-rc6
v5.0.0-rc7
v5.0.1
v5.0.1-rc1
v5.1.0
v5.1.0-rc1
v5.1.0-rc2
v5.1.0-rc3
v5.1.0-rc4
v5.2.0
v5.2.0-rc1
v5.2.0-rc2
v5.2.0-rc3
v5.2.0-rc4
v5.2.0-rc5
v5.2.0-rc6
v5.2.1
v5.2.1-rc1
v5.3.0
v5.3.0-rc1
v5.3.0-rc2
v5.3.0-rc3
v5.3.0-rc4
v5.3.0-rc5
v5.3.1
v5.3.1-rc1

v6.*

v6.3.0
v6.3.1
v6.3.2
v6.3.3
v6.3.4
v6.3.5
v6.3.6
v6.3.7
v6.3.8