Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2023-2763
Vulnerability from csaf_certbund
Published
2023-10-29 23:00
Modified
2023-11-27 23:00
Summary
Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Mattermost ist ein webbasierter Instant-Messaging-Dienst.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Mattermost ist ein webbasierter Instant-Messaging-Dienst.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Mattermost ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2763 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2763.json" }, { "category": "self", "summary": "WID-SEC-2023-2763 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2763" }, { "category": "external", "summary": "Mattermost Security Updates vom 2023-10-29", "url": "https://mattermost.com/security-updates/" } ], "source_lang": "en-US", "title": "Mattermost: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2023-11-27T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:00:42.562+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2763", "initial_release_date": "2023-10-29T23:00:00.000+00:00", "revision_history": [ { "date": "2023-10-29T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-11-27T23:00:00.000+00:00", "number": "2", "summary": "CVE\u0027s erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Mattermost Mattermost \u003c 7.8.13", "product": { "name": "Mattermost Mattermost \u003c 7.8.13", "product_id": "T030825", "product_identification_helper": { "cpe": "cpe:/a:mattermost:mattermost_server:7.8.13" } } }, { "category": "product_name", "name": "Mattermost Mattermost \u003c 8.1.4", "product": { "name": "Mattermost Mattermost \u003c 8.1.4", "product_id": "T030828", "product_identification_helper": { "cpe": "cpe:/a:mattermost:mattermost_server:8.1.4" } } }, { "category": "product_name", "name": "Mattermost Mattermost \u003c 9.1.1", "product": { "name": "Mattermost Mattermost \u003c 9.1.1", "product_id": "T030829", "product_identification_helper": { "cpe": "cpe:/a:mattermost:mattermost_server:9.1.1" } } }, { "category": "product_name", "name": "Mattermost Mattermost \u003c 9.0.2", "product": { "name": "Mattermost Mattermost \u003c 9.0.2", "product_id": "T030830", "product_identification_helper": { "cpe": "cpe:/a:mattermost:mattermost_server:9.0.2" } } } ], "category": "product_name", "name": "Mattermost" } ], "category": "vendor", "name": "Mattermost" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6202", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-6202" }, { "cve": "CVE-2023-48369", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-48369" }, { "cve": "CVE-2023-48268", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-48268" }, { "cve": "CVE-2023-47865", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-47865" }, { "cve": "CVE-2023-47168", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-47168" }, { "cve": "CVE-2023-45223", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-45223" }, { "cve": "CVE-2023-43754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-43754" }, { "cve": "CVE-2023-40703", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-40703" }, { "cve": "CVE-2023-35075", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Mattermost, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "release_date": "2023-10-29T23:00:00.000+00:00", "title": "CVE-2023-35075" } ] }
cve-2023-48369
Vulnerability from cvelistv5
Published
2023-11-27 09:10
Modified
2024-08-02 21:30
Severity ?
EPSS score ?
Summary
Mattermost fails to limit the log size of server logs allowing an attacker sending specially crafted requests to different endpoints to potentially overflow the log.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:30:33.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "vultza (vultza)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to limit the log size of server logs allowing an attacker sending specially crafted requests to different endpoints to potentially overflow the log. \u003c/p\u003e" } ], "value": "Mattermost fails to limit the log size of server logs allowing an attacker sending specially crafted requests to different endpoints to potentially overflow the log. \n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:10:21.484Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00233", "defect": [ "https://mattermost.atlassian.net/browse/MM-53850" ], "discovery": "EXTERNAL" }, "title": "Log Flooding due to specially crafted requests in different endpoints", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-48369", "datePublished": "2023-11-27T09:10:21.484Z", "dateReserved": "2023-11-22T11:18:57.618Z", "dateUpdated": "2024-08-02T21:30:33.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6202
Vulnerability from cvelistv5
Published
2023-11-27 09:12
Modified
2024-10-11 17:58
Severity ?
EPSS score ?
Summary
Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user to get their information (e.g. name, surname, nickname) via Mattermost Boards.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:21:17.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6202", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:51:36.345798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T17:58:15.479Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "DoyenSec" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows t\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehe ID of another user\u0026nbsp;\u003c/span\u003eto get their information (e.g. name, surname, nickname) via Mattermost Boards.\u003c/p\u003e" } ], "value": "Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user\u00a0to get their information (e.g. name, surname, nickname) via Mattermost Boards.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:12:04.786Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00254", "defect": [ "https://mattermost.atlassian.net/browse/MM-54365" ], "discovery": "EXTERNAL" }, "title": "Insecure Direct Object Reference in /plugins/focalboard/ api/v2/users of Mattermost Boards", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-6202", "datePublished": "2023-11-27T09:12:04.786Z", "dateReserved": "2023-11-20T12:24:12.551Z", "dateUpdated": "2024-10-11T17:58:15.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47168
Vulnerability from cvelistv5
Published
2023-11-27 09:12
Modified
2024-12-02 19:32
Severity ?
EPSS score ?
Summary
Mattermost fails to properly check a redirect URL parameter allowing for an open redirect was possible when the user clicked "Back to Mattermost" after providing a invalid custom url scheme in /oauth/{service}/mobile_login?redirect_to=
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 8.1.3 Version: 0 ≤ 7.8.12 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:01:22.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-47168", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T19:32:32.997484Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T19:32:41.338Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "DoyenSec" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to properly check a redirect URL parameter allowing for an\u0026nbsp;open redirect was possible when the user clicked \"Back to Mattermost\" after providing a invalid custom url scheme in /oauth/{service}/mobile_login?redirect_to=\u003c/p\u003e" } ], "value": "Mattermost fails to properly check a redirect URL parameter allowing for an\u00a0open redirect was possible when the user clicked \"Back to Mattermost\" after providing a invalid custom url scheme in /oauth/{service}/mobile_login?redirect_to=\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601: URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:12:52.781Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00252", "defect": [ "https://mattermost.atlassian.net/browse/MM-54488" ], "discovery": "EXTERNAL" }, "title": "Open redirect in /oauth/\u003cservice\u003e/mobile_login?redirect_to=", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-47168", "datePublished": "2023-11-27T09:12:52.781Z", "dateReserved": "2023-11-20T12:06:31.671Z", "dateUpdated": "2024-12-02T19:32:41.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-48268
Vulnerability from cvelistv5
Published
2023-11-27 09:07
Modified
2024-12-02 19:33
Severity ?
EPSS score ?
Summary
Mattermost fails to limit the amount of data extracted from compressed archives during board import in Mattermost Boards allowing an attacker to consume excessive resources, possibly leading to Denial of Service, by importing a board using a specially crafted zip (zip bomb).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:23:39.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48268", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T19:33:03.704927Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T19:33:50.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "vultza (vultza)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to\u0026nbsp;limit the amount of data extracted from compressed archives during board import in Mattermost Boards\u0026nbsp;allowing \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ean attacker t\u003c/span\u003eo consume excessive resources, possibly leading to Denial of Service, by\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;importing a board using a specially crafted zip (zip bomb).\u003c/span\u003e\u003c/p\u003e" } ], "value": "Mattermost fails to\u00a0limit the amount of data extracted from compressed archives during board import in Mattermost Boards\u00a0allowing an attacker to consume excessive resources, possibly leading to Denial of Service, by\u00a0importing a board using a specially crafted zip (zip bomb).\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:07:29.918Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.1.1, 9.0.2, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.1.1, 9.0.2, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00218", "defect": [ "https://mattermost.atlassian.net/browse/MM-53231" ], "discovery": "EXTERNAL" }, "title": "Denial of Service via Board Import Zip Bomb", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-48268", "datePublished": "2023-11-27T09:07:29.918Z", "dateReserved": "2023-11-22T11:18:57.625Z", "dateUpdated": "2024-12-02T19:33:50.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40703
Vulnerability from cvelistv5
Published
2023-11-27 09:08
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing a attacker to consume excessive resources, possibly leading to Denial of Service, by patching the field of a block using a specially crafted string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:51.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "vultza (vultza)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing\u0026nbsp;a attacker to\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003econsume excessive resources, possibly leading to Denial of Service, by\u003c/span\u003e\u0026nbsp;patching the field of a block using a specially crafted string.\u0026nbsp;\u003c/p\u003e" } ], "value": "Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing\u00a0a attacker to\u00a0consume excessive resources, possibly leading to Denial of Service, by\u00a0patching the field of a block using a specially crafted string.\u00a0\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:08:31.251Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.1.1, 9.0.2, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.1.1, 9.0.2, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00219", "defect": [ "https://mattermost.atlassian.net/browse/MM-53233" ], "discovery": "EXTERNAL" }, "title": "Denial of Service via specially crafted block fields in Mattermost Boards", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-40703", "datePublished": "2023-11-27T09:08:31.251Z", "dateReserved": "2023-11-22T11:18:57.610Z", "dateUpdated": "2024-08-02T18:38:51.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43754
Vulnerability from cvelistv5
Published
2023-11-27 09:11
Modified
2024-08-02 19:52
Severity ?
EPSS score ?
Summary
Mattermost fails to check whether the “Allow users to view archived channels” setting is enabled during permalink previews display, allowing members to view permalink previews of archived channels even if the “Allow users to view archived channels” setting is disabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 Version: 0 ≤ 9.0.1 Version: 0 ≤ 9.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.0.1", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "9.1.0", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "9.0.2" }, { "status": "unaffected", "version": "9.1.1" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Harrison Healey" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to check whether the\u0026nbsp; \u201cAllow users to view archived channels\u201d\u0026nbsp; setting is enabled during permalink previews display, allowing members to view permalink previews of archived channels even if the\u0026nbsp;\u201cAllow users to view archived channels\u201d setting is disabled.\u0026nbsp;\u003c/p\u003e" } ], "value": "Mattermost fails to check whether the\u00a0 \u201cAllow users to view archived channels\u201d\u00a0 setting is enabled during permalink previews display, allowing members to view permalink previews of archived channels even if the\u00a0\u201cAllow users to view archived channels\u201d setting is disabled.\u00a0\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:11:13.283Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00241", "defect": [ "https://mattermost.atlassian.net/browse/MM-54221" ], "discovery": "INTERNAL" }, "title": "Permalink previews displayed for posts in archived channels even if users are disallowed to view archived channels", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-43754", "datePublished": "2023-11-27T09:11:13.283Z", "dateReserved": "2023-11-22T11:37:35.971Z", "dateUpdated": "2024-08-02T19:52:11.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-47865
Vulnerability from cvelistv5
Published
2023-11-27 09:05
Modified
2024-08-02 21:16
Severity ?
EPSS score ?
Summary
Mattermost fails to check if hardened mode is enabled when overriding the username and/or the icon when posting a post. If settings allowed integrations to override the username and profile picture when posting, a member could also override the username and icon when making a post even if the Hardened Mode setting was enabled
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 8.1.3 Version: 0 ≤ 7.8.12 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:16:43.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Eva Sarafianou" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to check if hardened mode is enabled when overriding the username and/or the icon when posting a post. If settings allowed integrations to override the username and profile picture when posting, a member could also override the username and icon when making a post even if the Hardened Mode setting was enabled\u003c/p\u003e" } ], "value": "Mattermost fails to check if hardened mode is enabled when overriding the username and/or the icon when posting a post. If settings allowed integrations to override the username and profile picture when posting, a member could also override the username and icon when making a post even if the Hardened Mode setting was enabled\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:05:19.917Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00198", "defect": [ "https://mattermost.atlassian.net/browse/MM-52791" ], "discovery": "INTERNAL" }, "title": "Username and Icon override can be used by members when Hardened Mode is enabled", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-47865", "datePublished": "2023-11-27T09:05:19.917Z", "dateReserved": "2023-11-22T11:37:35.979Z", "dateUpdated": "2024-08-02T21:16:43.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35075
Vulnerability from cvelistv5
Published
2023-11-27 09:09
Modified
2024-08-02 16:23
Severity ?
EPSS score ?
Summary
Mattermost fails to use innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 8.1.3 Version: 0 ≤ 7.8.12 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:23:58.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Harrison Healey" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to use\u0026nbsp; innerText /\u0026nbsp;textContent\u0026nbsp;when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim\u0027s page by create a channel name that is valid HTML. No XSS is possible though.\u0026nbsp;\u003c/p\u003e" } ], "value": "Mattermost fails to use\u00a0 innerText /\u00a0textContent\u00a0when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim\u0027s page by create a channel name that is valid HTML. No XSS is possible though.\u00a0\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:09:19.659Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00228", "defect": [ "https://mattermost.atlassian.net/browse/MM-53371" ], "discovery": "EXTERNAL" }, "title": "HTML injection via channel autocomplete", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-35075", "datePublished": "2023-11-27T09:09:19.659Z", "dateReserved": "2023-11-20T12:06:31.656Z", "dateUpdated": "2024-08-02T16:23:58.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45223
Vulnerability from cvelistv5
Published
2023-11-27 09:06
Modified
2024-08-02 20:14
Severity ?
EPSS score ?
Summary
Mattermost fails to properly validate the "Show Full Name" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Mattermost | Mattermost |
Version: 0 ≤ 7.8.12 Version: 0 ≤ 8.1.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://mattermost.com/security-updates" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Mattermost", "vendor": "Mattermost", "versions": [ { "lessThanOrEqual": "7.8.12", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "8.1.3", "status": "affected", "version": "0", "versionType": "semver" }, { "status": "unaffected", "version": "7.8.13" }, { "status": "unaffected", "version": "8.1.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Pyae Phyo (pyae_phyo)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMattermost fails to properly validate the \"Show Full Name\" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled.\u0026nbsp;\u003c/p\u003e" } ], "value": "Mattermost fails to properly validate the \"Show Full Name\" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled.\u00a0\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:06:34.489Z", "orgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "shortName": "Mattermost" }, "references": [ { "url": "https://mattermost.com/security-updates" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate Mattermost Server to versions 7.8.13, 8.1.4 or higher.\u003c/p\u003e" } ], "value": "Update Mattermost Server to versions 7.8.13, 8.1.4 or higher.\n\n" } ], "source": { "advisory": "MMSA-2023-00216", "defect": [ "https://mattermost.atlassian.net/browse/MM-53189" ], "discovery": "EXTERNAL" }, "title": "Users full name disclosure through Mattermost Boards with Show Full Name Option disabled", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9302f53e-dde5-4bf3-b2f2-a83f91ac0eee", "assignerShortName": "Mattermost", "cveId": "CVE-2023-45223", "datePublished": "2023-11-27T09:06:34.489Z", "dateReserved": "2023-11-20T12:06:31.664Z", "dateUpdated": "2024-08-02T20:14:19.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.