Description
Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34634 | Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers. |
References
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates/ |
|
History
Wed, 25 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Incorrect defaults can cause attackers to bypass rate limitations | Incorrect defaults can cause attackers to bypass rate limitations |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 06 Dec 2024 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2024-12-06T23:08:46.139Z
Reserved: 2022-07-11T00:00:00.000Z
Link: CVE-2022-2366
Updated: 2024-08-03T00:32:09.696Z
Status : Modified
Published: 2022-07-12T14:15:15.743
Modified: 2024-11-21T07:00:50.860
Link: CVE-2022-2366
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD