Mattermost Mobile app versions 2.13.0 and earlier use a...
Low severity
Unreviewed
Published
Apr 16, 2024
to the GitHub Advisory Database
•
Updated Apr 16, 2024
Description
Published by the National Vulnerability Database
Apr 16, 2024
Published to the GitHub Advisory Database
Apr 16, 2024
Last updated
Apr 16, 2024
Mattermost Mobile app versions 2.13.0 and earlier use a regular expression with polynomial complexity to parse certain deeplinks, which allows an unauthenticated remote attacker to freeze or crash the app via a long maliciously crafted link.
References