Lucene search

K
hackeroneThesecuritydevH1:1253732
HistoryJul 07, 2021 - 4:59 p.m.

Mattermost: Specially crafted message request crashes the webapp for users who view the message

2021-07-0716:59:31
thesecuritydev
hackerone.com
$150
16
specially crafted message
message request
webapp crash
impact
bug bounty
json parameter
security vulnerability
mattermost

EPSS

0.001

Percentile

36.3%

Summary:

If you post a message with a modified deleted_at JSON parameter, the webapp will crash for anyone currently viewing the channel, or for anyone viewing a different channel if they switch to that channel afterward.

Steps To Reproduce:

  1. Go to a team channel, with Burp Suite ready.
  2. Send a message, intercepting the request with Burp. The JSON request contains keys like message, channel_id, and pending_post_id.
  3. Add the following key to the JSON request: deleted_at, with a value that’s greater than 0. For example: "deleted_at": 10.
  4. Now if you send the request, the webapp will crash with a blank screen and you will have to refresh the page. Note: If you want to send the request again, you may have to update the pending_post_id to some other unique value.

It affects all users viewing the channel, not just the sender. Also, you don’t even have to be in the channel when the message is sent. If you are already on a different channel, and you switch to the affected channel after the message is sent, it still has the same effect.

Impact

A user could prevent others from accessing a channel by continually making this request so that it’s impossible to load the webapp, because a new message would come and crash it even after refreshing the page. And since after refreshing you will still be on the channel, it could prevent the users from having access to the entire webapp, as they may not be able to exit the channel quick enough to prevent the crash.

You could also send a DM to someone and when they click to view the message the webapp will crash.

EPSS

0.001

Percentile

36.3%

Related for H1:1253732