First published: Fri Jun 19 2020(Updated: )
An issue was discovered in Mattermost Server before 4.7.0, 4.6.2, and 4.5.2. An attacker could authenticate to a different user's account via a crafted SAML response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <4.5.2 | |
Mattermost | >=4.6.0<4.6.2 | |
Mattermost | =4.7.0-rc1 | |
Mattermost | =4.7.0-rc2 | |
Mattermost | =4.7.0-rc3 | |
Mattermost | =4.7.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21263 has a medium severity rating due to the potential for unauthorized account access.
To fix CVE-2018-21263, upgrade Mattermost Server to version 4.7.0 or later.
CVE-2018-21263 affects Mattermost Server versions prior to 4.7.0 and versions 4.6.2 and 4.5.2.
Yes, attackers can exploit CVE-2018-21263 using a crafted SAML response, which requires no user interaction.
CVE-2018-21263 facilitates an authentication bypass attack, allowing an attacker to authenticate as another user.