CVE-2022-1332:
Improper Privilege Management in Mattermost
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33338%
CWE
Published
4/14/2022
Updated
2/2/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/mattermost/mattermost-server/v6 | go | >= 6.4.0, < 6.4.2 | 6.4.2 |
github.com/mattermost/mattermost-server/v6 | go | >= 6.3.0, < 6.3.5 | 6.3.5 |
github.com/mattermost/mattermost-server/v6 | go | >= 6.0.0, < 6.2.5 | 6.2.5 |
github.com/mattermost/mattermost-server/v5 | go | < 5.37.9 | 5.37.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability describes improper privilege management in API endpoints related to server logs and config.json access. Given Mattermost's architecture: 1) Log and config endpoints would logically exist in api4 package (version 6.x) 2) The CWE-269 indicates missing authorization checks 3) The pattern matches known security patterns where controller functions implement endpoint handlers 4) 'getLogs' and 'getConfig' are standard API names for these resources 5) The vulnerability specifically mentions custom admin role bypass, implying these functions lacked granular permission checks introduced in patched versions.