First published: Fri Mar 15 2024(Updated: )
Mattermost versions 8.1.x before 8.1.10, 9.2.x before 9.2.6, 9.3.x before 9.3.2, and 9.4.x before 9.4.3 fail to limit the number of @-mentions processed per message, allowing an authenticated attacker to crash the client applications of other users via large, crafted messages.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | >=8.1.0<8.1.10 | |
Mattermost | >=9.2.0<9.2.6 | |
Mattermost | >=9.3.0<9.3.2 | |
Mattermost | >=9.4.0<9.4.3 |
Update Mattermost Server to versions 9.5, 9.4.3, 9.3.2, 9.2.6, 8.1.10 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2446 has a severity rating that indicates it is a denial of service vulnerability that can impact user experience by crashing client applications.
To fix CVE-2024-2446, upgrade Mattermost Server to versions 8.1.10, 9.2.6, 9.3.2, or 9.4.3 or later.
CVE-2024-2446 affects Mattermost Server versions 8.1.x before 8.1.10, 9.2.x before 9.2.6, 9.3.x before 9.3.2, and 9.4.x before 9.4.3.
CVE-2024-2446 enables an authenticated attacker to send crafted messages that can crash the client applications of other users.
There are no specific workarounds for CVE-2024-2446; the best mitigation is to apply the recommended software updates.