First published: Fri Jun 19 2020(Updated: )
An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It allows attackers to cause a denial of service (memory consumption) via an outgoing webhook or a slash command integration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <4.10.5 | |
Mattermost | >=5.5.0<5.5.2 | |
Mattermost | >=5.6.0<5.6.3 | |
Mattermost | =5.7.0-rc1 | |
Mattermost | =5.7.0-rc2 | |
Mattermost | =5.7.0-rc3 | |
Mattermost | =5.7.0-rc4 | |
Mattermost | =5.7.0-rc5 | |
Mattermost | =5.7.0-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20888 is classified as a denial of service vulnerability that can lead to memory consumption issues in Mattermost Server.
To fix CVE-2019-20888, upgrade Mattermost Server to version 5.7 or higher.
CVE-2019-20888 affects Mattermost Server versions prior to 5.7, including versions 5.6.3, 5.5.2, and 4.10.5.
CVE-2019-20888 allows attackers to generate excessive memory usage, ultimately leading to service disruptions.
Yes, CVE-2019-20888 can be exploited through outgoing webhooks or slash command integrations.