- Description
- Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.
- Source
- responsibledisclosure@mattermost.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6D311744-6A53-4DD9-BE49-46E72BE1FB32",
"versionEndExcluding": "6.3.9"
},
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06ABE3B1-53EA-42AB-B986-E5A660677075",
"versionEndExcluding": "6.5.2",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "73084053-CBD7-499B-9CDF-2DD26CA85FF6",
"versionEndExcluding": "6.6.2",
"versionStartIncluding": "6.6.0"
},
{
"criteria": "cpe:2.3:a:mattermost:mattermost_server:6.7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "13763CA7-57C3-4EBE-96D6-C244B5FE2704"
}
],
"operator": "OR"
}
]
}
]