CVE-2023-5969: Mattermost vulnerable to excessive memory consumption
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3016%
CWE
Published
11/6/2023
Updated
11/23/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mattermost/mattermost-server/v6 | go | < 7.8.12 | 7.8.12 |
| github.com/mattermost/mattermost/server/v8 | go | >= 8.0.0, < 8.0.4 | 8.0.4 |
| github.com/mattermost/mattermost/server/v8 | go | >= 8.1.0, < 8.1.3 | 8.1.3 |
| github.com/mattermost/mattermost/server/v8 | go | = 9.0.0 | 9.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the lack of validation on the length of the 'Location' header in the getRedirectLocation function. The pre-patch code cached any returned 'Location' value (even very large ones) via redirectLocationDataCache.SetWithExpiry, allowing memory exhaustion. The fix introduced RedirectLocationMaximumLength to reject oversized locations, confirming the absence of this check in the original function was the flaw.