First published: Mon Jul 11 2022(Updated: )
Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost Server | <6.3.9 | |
Mattermost Mattermost Server | >=6.4.0<6.5.2 | |
Mattermost Mattermost Server | >=6.6.0<6.6.2 | |
Mattermost Mattermost Server | =6.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-2366.
The severity of CVE-2022-2366 is medium with a CVSS score of 5.3.
CVE-2022-2366 allows an attacker to bypass rate limitations or manipulate IP addresses for audit logging in Mattermost versions 6.7.0 and earlier.
Mattermost versions 6.3.9, 6.4.0 to 6.5.2, 6.6.0 to 6.6.2, and 6.7.0 are affected by CVE-2022-2366.
To mitigate CVE-2022-2366, update to a version of Mattermost that is not affected by the vulnerability and follow the recommendations provided by Mattermost security updates.