First published: Wed Jan 03 2018(Updated: )
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mautic/core | >=2.0.0<2.12.0 | 2.12.0 |
Acquia Mautic | =2.0.0 | |
Acquia Mautic | =2.0.1 | |
Acquia Mautic | =2.1.0 | |
Acquia Mautic | =2.1.1 | |
Acquia Mautic | =2.2.0 | |
Acquia Mautic | =2.2.1 | |
Acquia Mautic | =2.3.0 | |
Acquia Mautic | =2.4.0 | |
Acquia Mautic | =2.5.0 | |
Acquia Mautic | =2.5.1 | |
Acquia Mautic | =2.6.0 | |
Acquia Mautic | =2.6.1 | |
Acquia Mautic | =2.7.0 | |
Acquia Mautic | =2.7.1 | |
Acquia Mautic | =2.8.0 | |
Acquia Mautic | =2.8.1 | |
Acquia Mautic | =2.8.2 | |
Acquia Mautic | =2.9.0-beta | |
Acquia Mautic | =2.9.1 | |
Acquia Mautic | =2.10.0-beta | |
Acquia Mautic | =2.10.1 | |
Acquia Mautic | =2.11.0-beta | |
Mautic Mautic | =2.9.0 | |
Mautic Mautic | =2.9.2 | |
Mautic Mautic | =2.10.0 | |
Mautic Mautic | =2.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000489 is a vulnerability in Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed that could allow a disabled user to still login using an email address.
CVE-2017-1000489 has a severity score of 8.1 (high severity).
To fix CVE-2017-1000489, you should upgrade to Mautic version 2.12.0 or later.
No, there are no known workarounds for CVE-2017-1000489.
You can find more information about CVE-2017-1000489 on the GitHub Security Advisory and NIST NVD websites.