CVE-2022-2366

Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
References
Link Resource
https://mattermost.com/security-updates/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:6.7.0:*:*:*:*:*:*:*

History

28 Jul 2022, 15:37

Type Values Removed Values Added
CWE CWE-276
CPE cpe:2.3:a:mattermost:mattermost_server:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
References (MISC) https://mattermost.com/security-updates/ - (MISC) https://mattermost.com/security-updates/ - Vendor Advisory

12 Jul 2022, 14:28

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-12 14:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-2366

Mitre link : CVE-2022-2366

CVE.ORG link : CVE-2022-2366


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-276

Incorrect Default Permissions