
CVE-2023-28359
https://notcve.org/view.php?id=CVE-2023-28359
11 May 2023 — A NoSQL injection vulnerability has been identified in the listEmojiCustom method call within Rocket.Chat. This can be exploited by unauthenticated users when there is at least one custom emoji uploaded to the Rocket.Chat instance. The vulnerability causes a delay in the server response, with the potential for limited impact. • https://hackerone.com/reports/1757676 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-28325
https://notcve.org/view.php?id=CVE-2023-28325
11 May 2023 — An improper authorization vulnerability exists in Rocket.Chat <6.0 that could allow a hacker to manipulate the rid parameter and change the updateMessage method that only checks whether the user is allowed to edit message in the target room. • https://hackerone.com/reports/1406479 • CWE-285: Improper Authorization CWE-287: Improper Authentication CWE-863: Incorrect Authorization •

CVE-2023-28356
https://notcve.org/view.php?id=CVE-2023-28356
11 May 2023 — A vulnerability has been identified where a maliciously crafted message containing a specific chain of characters can cause the chat to enter a hot loop on one of the processes, consuming ~120% CPU and rendering the service unresponsive. • https://hackerone.com/reports/1461340 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-28318
https://notcve.org/view.php?id=CVE-2023-28318
09 May 2023 — A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices. • https://hackerone.com/reports/1379451 • CWE-285: Improper Authorization CWE-346: Origin Validation Error •

CVE-2023-28317
https://notcve.org/view.php?id=CVE-2023-28317
09 May 2023 — A vulnerability has been discovered in Rocket.Chat, where editing messages can change the original timestamp, causing the UI to display messages in an incorrect order. • https://hackerone.com/reports/1379635 • CWE-285: Improper Authorization CWE-494: Download of Code Without Integrity Check •

CVE-2023-28316
https://notcve.org/view.php?id=CVE-2023-28316
09 May 2023 — A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled. • https://hackerone.com/reports/992280 • CWE-384: Session Fixation •

CVE-2023-23911
https://notcve.org/view.php?id=CVE-2023-23911
10 Mar 2023 — An improper access control vulnerability exists prior to v6 that could allow an attacker to break the E2E encryption of a chat room by a user changing the group key of a chat room. • https://hackerone.com/reports/1757663 • CWE-284: Improper Access Control CWE-326: Inadequate Encryption Strength •

CVE-2023-23917
https://notcve.org/view.php?id=CVE-2023-23917
23 Feb 2023 — A prototype pollution vulnerability exists in Rocket.Chat server <5.2.0 that could allow an attacker to a RCE under the admin account. Any user can create their own server in your cloud and become an admin so this vulnerability could affect the cloud infrastructure. This attack vector also may increase the impact of XSS to RCE which is dangerous for self-hosted users as well. • https://hackerone.com/reports/1631258 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVE-2022-44567
https://notcve.org/view.php?id=CVE-2022-44567
23 Dec 2022 — A command injection vulnerability exists in Rocket.Chat-Desktop <3.8.14 that could allow an attacker to pass a malicious url of openInternalVideoChatWindow to shell.openExternal(), which may lead to remote code execution (internalVideoChatWindow.ts#L17). To exploit the vulnerability, the internal video chat window must be disabled or a Mac App Store build must be used (internalVideoChatWindow.ts#L14). The vulnerability may be exploited by an XSS attack because the function openInternalVideoChatWindow is exp... • https://hackerone.com/reports/1781102 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2022-32217
https://notcve.org/view.php?id=CVE-2022-32217
23 Sep 2022 — A cleartext storage of sensitive information exists in Rocket.Chat <v4.6.4 due to Oauth token being leaked in plaintext in Rocket.chat logs. Se presenta un almacenamiento en texto sin cifrar de información confidencial en Rocket.Chat versiones anteriores a v4.6.4, debido a que el token Oauth es filtrado en texto plano en los registros de Rocket.chat. • https://hackerone.com/reports/1394399 • CWE-312: Cleartext Storage of Sensitive Information CWE-532: Insertion of Sensitive Information into Log File •