First published: Thu Feb 29 2024(Updated: )
Mattermost fails to properly validate the length of the emoji value in the custom user status, allowing an attacker to send multiple times a very long string as an emoji value causing high resource consumption and possibly crashing the server.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | <8.1.9 | 8.1.9 |
go/github.com/mattermost/mattermost/server/v8 | >=9.2.0<9.2.5 | 9.2.5 |
go/github.com/mattermost/mattermost/server/v8 | >=9.3.0<9.3.1 | 9.3.1 |
Mattermost | <8.1.8 | |
Mattermost | >=9.0.0<9.1.5 | |
Mattermost | >=9.2.0<9.2.4 |
Update Mattermost Server to versions 9.4.0, 9.3.1, 9.2.5, 8.1.9 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24988 is considered a medium severity vulnerability due to its potential to cause high resource consumption and possibly crash the server.
To mitigate CVE-2024-24988, upgrade Mattermost to version 8.1.9, 9.2.5, or 9.3.1, as these versions address the vulnerability.
CVE-2024-24988 allows attackers to send excessively long strings as emoji values which can lead to resource exhaustion.
CVE-2024-24988 affects Mattermost versions prior to 8.1.9, between 9.0.0 and 9.1.5, and between 9.2.0 and 9.2.4.
There are no official workarounds for CVE-2024-24988; the recommended action is to upgrade to a fixed version.