Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
References
Link | Resource |
---|---|
https://mattermost.com/security-updates/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-07-12 07:15
Updated : 2022-07-28 08:37
NVD link : CVE-2022-2366
Mitre link : CVE-2022-2366
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
mattermost
- mattermost_server