CVE-2024-1953:
Mattermost fails to limit the number of role names
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.33799%
CWE
Published
2/29/2024
Updated
12/13/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/mattermost/mattermost/server/v8 | go | >= 9.4.0, < 9.4.2 | 9.4.2 |
github.com/mattermost/mattermost/server/v8 | go | >= 9.3.0, < 9.3.1 | 9.3.1 |
github.com/mattermost/mattermost/server/v8 | go | >= 9.2.0, < 9.2.5 | 9.2.5 |
github.com/mattermost/mattermost/server/v8 | go | < 8.1.9 | 8.1.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing input validation on API endpoints handling role name requests, but the provided information contains no code references, commit diffs, or specific function names. While the vulnerability likely exists in role query handling functions (e.g., API handlers processing role parameters), the advisory lacks technical details to identify exact functions. The CWEs (400/770) suggest missing resource limits, but without patch details or code context, we cannot confidently name specific vulnerable functions.