First published: Fri Mar 15 2024(Updated: )
Resource Exhaustion in Mattermost Server versions 8.1.x before 8.1.10 fails to limit the size of the payload that can be read and parsed allowing an attacker to send a very large email payload and crash the server.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-server/v6 | <0.0.0-20240209181221-674f549daf0e | 0.0.0-20240209181221-674f549daf0e |
go/github.com/mattermost/mattermost-server/v5 | <0.0.0-20240209181221-674f549daf0e | 0.0.0-20240209181221-674f549daf0e |
go/github.com/mattermost/mattermost-server | <0.0.0-20240209181221-674f549daf0e | 0.0.0-20240209181221-674f549daf0e |
go/github.com/mattermost/mattermost/server/v8 | <0.0.0-20240209181221-674f549daf0e | 0.0.0-20240209181221-674f549daf0e |
Mattermost | >=8.1.0<8.1.10 |
Update Mattermost Server to versions 9.5.0, 8.1.10 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28053 is classified as a high severity vulnerability due to its potential to crash the Mattermost server.
To fix CVE-2024-28053, update your Mattermost Server to version 8.1.10 or later.
CVE-2024-28053 affects Mattermost Server versions 8.1.x before 8.1.10.
CVE-2024-28053 allows an attacker to perform a resource exhaustion attack by sending a very large email payload.
Additional details on CVE-2024-28053 can typically be found in security advisories published by Mattermost.