First published: Fri Apr 26 2024(Updated: )
Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x before 9.4.5 fail to limit the number of active sessions, which allows an authenticated attacker to crash the server via repeated requests to the getSessions API after flooding the sessions table.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-server | >=8.1.0<=8.1.11 | 8.1.12 |
go/github.com/mattermost/mattermost-server | >=9.4.0<=9.4.4 | 9.4.5 |
go/github.com/mattermost/mattermost-server | >=9.5.0<=9.5.2 | 9.5.3 |
go/github.com/mattermost/mattermost-server | >=9.6.0-rc1<=9.6.0 | 9.6.1 |
Update Mattermost Server to versions 9.7.0, 9.6.1, 9.5.3, 9.4.5, 8.1.12 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.