Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03NjY0LWhjcDctZjQ5N84AA3lu

Mattermost Injection vulnerability

Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.

Permalink: https://github.com/advisories/GHSA-7664-hcp7-f497
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03NjY0LWhjcDctZjQ5N84AA3lu
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 5 months ago
Updated: 5 months ago


CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L

Identifiers: GHSA-7664-hcp7-f497, CVE-2023-6458
References: Blast Radius: 15.8

Affected Packages

go:github.com/mattermost/mattermost/server
Affected Version Ranges: >= 9.1.0, < 9.1.2
Fixed in: 9.1.2
go:github.com/mattermost/mattermost/server/v8
Dependent packages: 2
Dependent repositories: 1
Downloads:
Affected Version Ranges: >= 9.0.0, < 9.0.3, < 8.1.5
Fixed in: 9.0.3, 8.1.5
All affected versions:
All unaffected versions:
go:github.com/mattermost/mattermost-server/v6
Dependent packages: 111
Dependent repositories: 168
Downloads:
Affected Version Ranges: < 7.8.14
Fixed in: 7.8.14
All affected versions: 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.3.9, 6.3.10, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.5.0, 6.5.1, 6.5.2, 6.6.0, 6.6.1, 6.6.2, 6.7.0, 6.7.1, 6.7.2
All unaffected versions: