First published: Mon Nov 27 2023(Updated: )
Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing a attacker to consume excessive resources, possibly leading to Denial of Service, by patching the field of a block using a specially crafted string.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-server/v6 | <7.8.13 | 7.8.13 |
go/github.com/mattermost/mattermost/server/v8 | <8.1.4 | 8.1.4 |
go/github.com/mattermost/mattermost/server/v8 | >=9.0.0<9.0.2 | 9.0.2 |
go/github.com/mattermost/mattermost/server/v8 | >=9.1.0<9.1.1 | 9.1.1 |
Mattermost | <=7.8.12 | |
Mattermost | >=8.0.0<=8.1.3 | |
Mattermost | >=9.0.0<=9.0.1 | |
Mattermost | =9.1.0 |
Update Mattermost Server to versions 9.1.1, 9.0.2, 7.8.13, 8.1.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40703 is a vulnerability in Mattermost Boards that allows an attacker to consume excessive resources, possibly leading to a Denial of Service, by patching the field of a block using a specially crafted string.
CVE-2023-40703 affects Mattermost versions 7.8.13 up to 9.1.1.
CVE-2023-40703 has a severity rating of 4.3, which is considered medium.
To fix CVE-2023-40703, it is recommended to update to Mattermost versions 7.8.14, 8.1.5, 9.0.3, or 9.1.2.
You can find more information about CVE-2023-40703 on the Mattermost website, NIST vulnerability database, and GitHub advisory.