Mattermost Mobile app versions 2.13.0 and earlier use a regular expression with polynomial complexity to parse certain deeplinks, which allows an unauthenticated remote attacker to freeze or crash the app via a long maliciously crafted link.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://mattermost.com/security-updates |
|
History
Tue, 21 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mattermost
Mattermost mattermost Mobile |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:mattermost:mattermost_mobile:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mattermost
Mattermost mattermost Mobile |
Status: PUBLISHED
Assigner: Mattermost
Published: 2024-04-16T09:05:04.719Z
Updated: 2024-08-01T20:26:57.005Z
Reserved: 2024-04-16T08:51:45.288Z
Link: CVE-2024-3872
Updated: 2024-08-01T20:26:57.005Z
Status : Analyzed
Published: 2024-04-16T09:15:08.817
Modified: 2025-01-21T16:57:31.850
Link: CVE-2024-3872
No data.
ReportizFlow