First published: Fri Jun 19 2020(Updated: )
An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. The Markdown library allows catastrophic backtracking.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <4.10.8 | |
Mattermost | >=5.7.0<5.7.3 | |
Mattermost | >=5.8.0<5.8.1 | |
Mattermost | =5.9.0-rc1 | |
Mattermost | =5.9.0-rc2 | |
Mattermost | =5.9.0-rc3 | |
Mattermost | =5.9.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20871 is classified as a medium to high severity vulnerability due to its potential for denial of service through catastrophic backtracking.
To fix CVE-2019-20871, upgrade to Mattermost Server version 5.9.0 or later, or apply the relevant patches provided by Mattermost.
Mattermost Server versions prior to 5.9.0, 5.8.1, 5.7.3, and 4.10.8 are affected by CVE-2019-20871.
CVE-2019-20871 is a denial of service vulnerability related to the Markdown library used in Mattermost Server.
While the best course of action is to upgrade, you may review your instance's configurations, though there are no officially recommended workarounds for this vulnerability.