First published: Fri Jun 19 2020(Updated: )
An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It mishandles permissions for user-access token creation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | >=4.10.0<4.10.5 | |
Mattermost | >=5.5.0<5.5.2 | |
Mattermost | >=5.6.0<5.6.3 | |
Mattermost | =5.7.0-rc1 | |
Mattermost | =5.7.0-rc2 | |
Mattermost | =5.7.0-rc3 | |
Mattermost | =5.7.0-rc4 | |
Mattermost | =5.7.0-rc5 | |
Mattermost | =5.7.0-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20889 has been rated as a medium severity vulnerability due to improper handling of user-access token creation.
To fix CVE-2019-20889, upgrade to Mattermost Server version 5.7 or later.
CVE-2019-20889 affects Mattermost Server versions earlier than 5.7, including 5.6.3, 5.5.2, and 4.10.5.
CVE-2019-20889 involves mishandled permissions related to the creation of user-access tokens.
Yes, Mattermost Server version 5.7 and later effectively address the issues related to CVE-2019-20889.