Description
Mattermost versions 8.1.x <= 8.1.10, 9.6.x <= 9.6.0, 9.5.x <= 9.5.2 and 8.1.x <= 8.1.11 fail to limit the size of a request path that includes user inputs which allows an attacker to cause excessive resource consumption, possibly leading to a DoS via sending large request paths

Published: 2024-04-26
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update Mattermost to versions 9.7.0, 8.1.11, 9.6.1, 9.5.3, 8.1.12 or higher.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1261 Mattermost fails to limit the size of a request path
Github GHSA Github GHSA GHSA-p2wq-4ggp-45f3 Mattermost fails to limit the size of a request path
History

Mon, 12 May 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
Weaknesses CWE-770
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Subscriptions

Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-08-01T22:35:34.806Z

Reserved: 2024-04-10T09:53:47.697Z

Link: CVE-2024-22091

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.806Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-26T09:15:11.880

Modified: 2025-05-12T13:37:38.673

Link: CVE-2024-22091

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-26T00:00:00Z

Links: CVE-2024-22091 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses