First published: Fri Jun 19 2020(Updated: )
An issue was discovered in Mattermost Server before 4.2.0, 4.1.1, and 4.0.5. It allows attackers to obtain sensitive information (user statuses) via a REST API version 4 endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost Server | <4.0.5 | |
Mattermost Mattermost Server | >=4.1.0<4.1.1 | |
Mattermost Mattermost Server | =4.2.0-rc1 | |
Mattermost Mattermost Server | =4.2.0-rc2 | |
Mattermost Mattermost Server | =4.2.0-rc3 | |
Mattermost Mattermost Server | =4.2.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-18895 is rated as medium with a CVSS score of 5.3.
Attackers can obtain sensitive information, such as user statuses, via the REST API version 4 endpoint in CVE-2017-18895.
Mattermost Server versions before 4.2.0, 4.1.1, and 4.0.5 are affected by CVE-2017-18895.