Miggo Logo

CVE-2023-4108: Mattermost fails to sanitize post metadata

4.5

CVSS Score
3.1

Basic Information

EPSS Score
0.35597%
Published
8/11/2023
Updated
11/9/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/mattermost/mattermost-server/v6go<= 7.8.77.8.8
github.com/mattermost/mattermost-server/v6go>= 7.9.0, <= 7.9.57.9.6
github.com/mattermost/mattermost-server/v6go>= 7.10.0, <= 7.10.37.10.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsanitized post metadata being logged during audit events. The audit.RecordPostEvent function is the logical point where post metadata would be processed for audit logging. Since the advisory explicitly mentions audit logging as the flawed mechanism, and Mattermost's architecture centralizes audit logging in the audit package, this function would handle post event metadata. The lack of sanitization before logging would occur here, matching the described CWE-200 and CWE-532 patterns. While the exact code isn't visible, the function's role in audit logging and the vulnerability's context strongly implicate it.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*tt*rmost **ils to s*nitiz* post m*t***t* *urin* *u*it lo**in*, r*sultin* in p*rm*links' *ont*nts **in* lo****.

Reasoning

T** vuln*r**ility st*ms *rom uns*nitiz** post m*t***t* **in* lo**** *urin* *u*it *v*nts. T** `*u*it.R**or*Post*v*nt` *un*tion is t** lo*i**l point w**r* post m*t***t* woul* ** pro**ss** *or *u*it lo**in*. Sin** t** **visory *xpli*itly m*ntions *u*it