CVE-2024-32046Sensitive Information Exposure in Mattermost Mattermost-server

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 73.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 26
Latest updateJun 5

Description

Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

NVDmattermost/mattermost_server8.1.08.1.12+3
CVEListV5mattermost/mattermost9.5.09.5.2+3

🔴Vulnerability Details

4
OSV
Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server2024-06-05
GHSA
Mattermost's detailed error messages reveal the full file path2024-04-26
OSV
Mattermost's detailed error messages reveal the full file path2024-04-26
CVEList
Detailed error discloses full file path with dev mode off2024-04-26

📋Vendor Advisories

1
Red Hat
mattermost: allows an attacker to get information about the server such as the full path were files are stored2024-04-26

🕵️Threat Intelligence

1
Tenable
Microsoft’s May 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-30051, CVE-2024-30040)2024-05-14
CVE-2024-32046 — Sensitive Information Exposure | cvebase