Page 3 of 47 results (0.008 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices. • https://hackerone.com/reports/1379451 • CWE-285: Improper Authorization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An improper access control vulnerability exists prior to v6 that could allow an attacker to break the E2E encryption of a chat room by a user changing the group key of a chat room. • https://hackerone.com/reports/1757663 • CWE-284: Improper Access Control CWE-326: Inadequate Encryption Strength •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A prototype pollution vulnerability exists in Rocket.Chat server <5.2.0 that could allow an attacker to a RCE under the admin account. Any user can create their own server in your cloud and become an admin so this vulnerability could affect the cloud infrastructure. This attack vector also may increase the impact of XSS to RCE which is dangerous for self-hosted users as well. • https://hackerone.com/reports/1631258 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A command injection vulnerability exists in Rocket.Chat-Desktop <3.8.14 that could allow an attacker to pass a malicious url of openInternalVideoChatWindow to shell.openExternal(), which may lead to remote code execution (internalVideoChatWindow.ts#L17). To exploit the vulnerability, the internal video chat window must be disabled or a Mac App Store build must be used (internalVideoChatWindow.ts#L14). The vulnerability may be exploited by an XSS attack because the function openInternalVideoChatWindow is exposed in the Rocket.Chat-Desktop-API. Existe una vulnerabilidad de inyección de comandos en Rocket.Chat-Desktop &lt;3.8.14 que podría permitir a un atacante pasar una URL maliciosa de openInternalVideoChatWindow a shell.openExternal(), lo que puede provocar la ejecución remota de código (internalVideoChatWindow.ts#L17). Para aprovechar la vulnerabilidad, se debe desactivar la ventana interna de chat de vídeo o se debe utilizar una versión de Mac App Store (internalVideoChatWindow.ts#L14). • https://hackerone.com/reports/1781102 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

A SQL injection vulnerability exists in Rocket.Chat <v3.18.6, <v4.4.4 and <v4.7.3 which can allow an attacker to retrieve a reset password token through or a 2fa secret. Se presenta una vulnerabilidad de inyección SQL en Rocket.Chat versiones anteriores a v3.18.6, versiones anteriores a v4.4.4 y versiones anteriores a v4.7.3, que puede permitir a un atacante recuperar un token de restablecimiento de contraseña a mediante un secreto 2fa. • https://hackerone.com/reports/1581059 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •