CVE-2022-2406
Vulnerability from cvelistv5
Published
2022-07-14 17:23
Modified
2024-08-03 00:39
Severity ?
EPSS score ?
Summary
Malicious imports can lead to Denial of Service
References
▼ | URL | Tags | |
---|---|---|---|
responsibledisclosure@mattermost.com | https://mattermost.com/security-updates/ | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Mattermost | Mattermost |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:39:07.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mattermost.com/security-updates/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "6.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "6.4.x" }, { "status": "affected", "version": "6.7.x 6.7.0" }, { "lessThanOrEqual": "6.5.1", "status": "affected", "version": "6.5.x", "versionType": "custom" }, { "lessThanOrEqual": "6.6.1", "status": "affected", "version": "6.6.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Juho Nurminen for contributing to this improvement under the Mattermost responsible disclosure policy." } ], "descriptions": [ { "lang": "en", "value": "The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-14T17:23:55", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mattermost.com/security-updates/" } ], "solutions": [ { "lang": "en", "value": "Update Mattermost to version v7.0.0, 6.7.1, 6.6.2, 6.5.2, 6.3.9 or higher." } ], "source": { "advisory": "MMSA-2022-00102", "discovery": "INTERNAL" }, "title": "Malicious imports can lead to Denial of Service", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "responsibledisclosure@mattermost.com", "ID": "CVE-2022-2406", "STATE": "PUBLIC", "TITLE": "Malicious imports can lead to Denial of Service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mattermost", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "6.3.8" }, { "version_affected": "=", "version_name": "6.4.x", "version_value": "6.4.x" }, { "version_affected": "\u003c=", "version_name": "6.5.x", "version_value": "6.5.1" }, { "version_affected": "\u003c=", "version_name": "6.6.x", "version_value": "6.6.1" }, { "version_affected": "=", "version_name": "6.7.x", "version_value": "6.7.0" } ] } } ] }, "vendor_name": "Mattermost" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Juho Nurminen for contributing to this improvement under the Mattermost responsible disclosure policy." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://mattermost.com/security-updates/", "refsource": "MISC", "url": "https://mattermost.com/security-updates/" } ] }, "solution": [ { "lang": "en", "value": "Update Mattermost to version v7.0.0, 6.7.1, 6.6.2, 6.5.2, 6.3.9 or higher." } ], "source": { "advisory": "MMSA-2022-00102", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2022-2406", "datePublished": "2022-07-14T17:23:55", "dateReserved": "2022-07-14T00:00:00", "dateUpdated": "2024-08-03T00:39:07.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-2406\",\"sourceIdentifier\":\"responsibledisclosure@mattermost.com\",\"published\":\"2022-07-14T18:15:08.367\",\"lastModified\":\"2023-06-30T18:49:51.597\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n de importaci\u00f3n de Slack heredada en Mattermost versiones 6.7.0 y anteriores, no limita apropiadamente el tama\u00f1o de los archivos importados, lo que permite a un atacante autenticado bloquear el servidor importando archivos grandes por medio de la API REST de importaci\u00f3n de Slack\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]},{\"source\":\"responsibledisclosure@mattermost.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.3.8\",\"matchCriteriaId\":\"96B6BD54-39E8-46D0-9CF5-952C104881AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndIncluding\":\"6.5.1\",\"matchCriteriaId\":\"54574FF7-8E64-4C4A-855D-716CB79C1B81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost:6.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB27A25-5C62-4DEF-8CE5-BFD0605D60F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost:6.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3CCC890-55C7-40B8-9FF8-F80811BD60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mattermost:mattermost:6.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7308C7-2774-49E3-8136-EF304DBDB110\"}]}]}],\"references\":[{\"url\":\"https://mattermost.com/security-updates/\",\"source\":\"responsibledisclosure@mattermost.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.