CVE-2024-4182Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost-server

Severity
4.3MEDIUMNVD
EPSS
0.2%
top 58.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 26
Latest updateJun 5

Description

Mattermost versions 9.6.0, 9.5.x before 9.5.3, 9.4.x before 9.4.5, and 8.1.x before 8.1.12 fail to handle JSON parsing errors in custom status values, which allows an authenticated attacker to crash other users' web clients via a malformed custom status.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

NVDmattermost/mattermost_server8.1.08.1.12+3
CVEListV5mattermost/mattermost9.5.09.5.2+3

🔴Vulnerability Details

4
OSV
Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server2024-06-05
OSV
Mattermost crashes web clients via a malformed custom status2024-04-26
CVEList
CVE-2024-4182: Mattermost versions 92024-04-26
GHSA
Mattermost crashes web clients via a malformed custom status2024-04-26

📋Vendor Advisories

1
Red Hat
mattermost: fail to handle JSON parsing errors in custom status values2024-04-26
CVE-2024-4182 — MEDIUM severity | cvebase