First published: Fri Apr 05 2024(Updated: )
Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | >=9.5.0<9.5.2 | 9.5.2 |
go/github.com/mattermost/mattermost/server/v8 | >=9.4.0<9.4.4 | 9.4.4 |
go/github.com/mattermost/mattermost/server/v8 | >=9.3.0<9.3.3 | 9.3.3 |
go/github.com/mattermost/mattermost/server/v8 | >=8.1.0<8.1.11 | 8.1.11 |
Mattermost | >=8.1.0<8.1.11 | |
Mattermost | >=9.3.0<9.3.3 | |
Mattermost | >=9.4.0<9.4.4 | |
Mattermost | >=9.5.0<9.5.2 |
Update Mattermost Server to versions 9.6.0, 9.5.2, 9.4.4, 9.3.3, 8.1.11 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28949 has been classified as a vulnerability that can lead to potential denial of service.
To fix CVE-2024-28949, upgrade to Mattermost Server version 9.5.2, 9.4.4, 9.3.3, or 8.1.11.
Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, and 8.1.x before 8.1.11 are affected.
CVE-2024-28949 allows an attacker to exploit user preferences to potentially cause a denial of service.
There are no documented workarounds for CVE-2024-28949; updating to a fixed version is recommended.