{"id":"CVE-2024-22091","details":"Mattermost versions 8.1.x \u003c= 8.1.10, 9.6.x \u003c= 9.6.0, 9.5.x \u003c= 9.5.2 and 8.1.x \u003c= 8.1.11 fail to limit the size of a request path that includes user inputs which allows an attacker to cause excessive resource consumption, possibly leading to a DoS via sending large request paths\n\n","aliases":["GHSA-p2wq-4ggp-45f3","GO-2024-2796"],"modified":"2026-03-13T07:50:03.398196Z","published":"2024-04-26T09:15:11.880Z","references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"096c9ea12a2144f832e330e9a0f4d3862ca20b9f"},{"fixed":"c91d188755c63cc41237105b5f871a341e5faafd"},{"introduced":"99d819d25d0b16b3faed901b1fe5c41de7655e9c"},{"fixed":"baf02ba4e27d641a53785ab0c6bc9a9870b237a6"},{"introduced":"9fc0f464a376499ca5859944483f09a32370a85a"},{"fixed":"13049d8b16b195f98246dff4812b5f64c1e5a627"}],"database_specific":{"versions":[{"introduced":"8.1.0"},{"fixed":"8.1.12"},{"introduced":"9.5.0"},{"fixed":"9.5.3"},{"introduced":"9.6.0"},{"fixed":"9.6.1"}]}}],"versions":["@mattermost/client@8.1.1","@mattermost/client@9.5.0","@mattermost/client@9.6.0","@mattermost/types@8.1.1","@mattermost/types@9.5.0","@mattermost/types@9.6.0","v8.1.0","v8.1.0-rc2","v8.1.1","v8.1.1-rc1","v8.1.1-rc2","v8.1.10","v8.1.10-rc1","v8.1.11","v8.1.11-rc1","v8.1.12-rc1","v8.1.12-rc2","v8.1.12-rc3","v8.1.2","v8.1.2-rc1","v8.1.2-rc2","v8.1.3","v8.1.3-rc1","v8.1.3-rc2","v8.1.4","v8.1.4-rc1","v8.1.4-rc2","v8.1.5","v8.1.5-rc1","v8.1.5-rc2","v8.1.6","v8.1.6-rc1","v8.1.7","v8.1.7-rc1","v8.1.7-rc2","v8.1.7-rc3","v8.1.8","v8.1.8-rc1","v8.1.8-rc2","v8.1.9","v8.1.9-rc1","v8.1.9-rc2","v9.5.0","v9.5.0-rc3","v9.5.1","v9.5.1-rc1","v9.5.2","v9.5.3-rc1","v9.5.3-rc2","v9.5.3-rc3","v9.6.0","v9.6.0-rc3","v9.6.1-rc1","v9.6.1-rc2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-22091.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}