Mattermost

Mattermost Server

336 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.21%
  • Veröffentlicht 27.02.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:52:33

Mattermost fails to honor the ShowEmailAddress setting when constructing a response to the "Regenerate Invite Id" API endpoint, allowing an attacker with team admin privileges to learn the team owner's email address in the response.

Exploit
  • EPSS 0.48%
  • Veröffentlicht 23.09.2022 15:15:13
  • Zuletzt bearbeitet 21.11.2024 07:19:09

Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server...

  • EPSS 0.73%
  • Veröffentlicht 09.09.2022 15:15:15
  • Zuletzt bearbeitet 21.11.2024 07:18:55

Mattermost version 7.0.x and earlier fails to sufficiently limit the in-memory sizes of concurrently uploaded JPEG images, which allows authenticated users to cause resource exhaustion on specific system configurations, resulting in server-side Denia...

  • EPSS 0.33%
  • Veröffentlicht 14.07.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:55

Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs.

  • EPSS 0.19%
  • Veröffentlicht 12.07.2022 14:15:15
  • Zuletzt bearbeitet 21.11.2024 07:00:50

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.

  • EPSS 0.43%
  • Veröffentlicht 02.06.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:41:53

Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post.

  • EPSS 0.33%
  • Veröffentlicht 19.04.2022 21:15:14
  • Zuletzt bearbeitet 21.11.2024 06:40:37

Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace wh...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 19.04.2022 21:15:14
  • Zuletzt bearbeitet 21.11.2024 06:40:37

Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and c...

  • EPSS 0.13%
  • Veröffentlicht 13.04.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:40:30

One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file...

  • EPSS 0.43%
  • Veröffentlicht 13.04.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:40:31

The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.