Lucene search

K
githubGitHub Advisory DatabaseGHSA-JCGV-3PFQ-J4HR
HistoryNov 27, 2023 - 12:30 p.m.

Mattermost Injection vulnerability

2023-11-2712:30:54
CWE-74
GitHub Advisory Database
github.com
5
mattermost
injection
vulnerability
html
channel
name
webapp
autocomplete
attacker
page
xss
software

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Mattermost fails to use innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim’s page by create a channel name that is valid HTML. No XSS is possible though.

Affected configurations

Vulners
Node
github.com\/mattermost\/mattermostserver\/v6Range<7.8.13
OR
github.com\/mattermost\/mattermostserverRange<8.1.4

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

5.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Related for GHSA-JCGV-3PFQ-J4HR