Miggo Logo

CVE-2024-47401: Mattermost Server vulnerable to application crash from attacker-generated large response

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.30992%
Published
10/29/2024
Updated
11/4/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/mattermost/mattermost/server/v8go< 8.0.0-20240926115259-20ed58906adc8.0.0-20240926115259-20ed58906adc

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unconstrained GraphQL response generation in Playbooks. Key indicators include:

  1. CWE-770 (resource allocation without limits) suggests missing response size throttling
  2. The attack vector involves crafted Playbooks requests triggering large responses
  3. The Go module path indicates server/v8/channels/app/playbooks as the likely location
  4. GraphQL resolvers and error handlers are common amplification points While specific function names aren't provided in the advisory, the pattern matches:
  • GraphQL resolver methods processing Playbooks data
  • Error handlers generating verbose responses Confidence is medium due to lack of direct code references, but the technical description strongly suggests these components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*tt*rmost v*rsions *.**.x <= *.**.*, *.**.x <= *.**.* *n* *.*.x <= *.*.* **il to pr*v*nt **t*il** *rror m*ss***s *rom **in* *ispl*y** in Pl*y*ooks w*i** *llows *n *tt**k*r to **n*r*t* * l*r** r*spons* *n* **us* *n *mpli*i** *r*p*QL r*spons* w*i** in

Reasoning

T** vuln*r**ility st*ms *rom un*onstr*in** *r*p*QL r*spons* **n*r*tion in Pl*y*ooks. K*y in*i**tors in*lu**: *. *W*-*** (r*sour** *llo**tion wit*out limits) su***sts missin* r*spons* siz* t*rottlin* *. T** *tt**k v**tor involv*s *r**t** Pl*y*ooks r*q