cve/2024/CVE-2024-2445.md

22 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-2445](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2445)
![](https://img.shields.io/static/v1?label=Product&message=Mattermost&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brightgreen)
### Description
Mattermost Jira plugin versions shipped with Mattermost versions 8.1.x before 8.1.10, 9.2.x before 9.2.6, 9.3.x before 9.3.2, and 9.4.x before 9.4.3 fail to escape user-controlled outputs when generating HTML pages, which allows an attacker to perform reflected cross-site scripting attacks against the users of the Mattermost server.
### POC
#### Reference
- https://mattermost.com/security-updates
#### Github
No PoCs found on GitHub currently.