First published: Wed Apr 13 2022(Updated: )
One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost Server | >=5.37.0<5.37.9 | |
Mattermost Mattermost Server | >=6.2.0<6.2.5 | |
Mattermost Mattermost Server | >=6.3.0<6.3.5 | |
Mattermost Mattermost Server | >=6.4.0<6.4.2 |
Update Mattermost to version v6.4.2, 6.3.5, 6.2.5, or 5.37.9, depending on the minor version being run
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1332 is a vulnerability in Mattermost version 6.4.1 and earlier that allows authenticated members with restricted custom admin role to bypass restrictions and view server logs and config.json file contents.
Mattermost versions 5.37.0 to 5.37.9, 6.2.0 to 6.2.5, 6.3.0 to 6.3.5, and 6.4.0 to 6.4.2 are affected by CVE-2022-1332.
CVE-2022-1332 has a severity rating of 4.3 out of 10.
To fix CVE-2022-1332, it is recommended to upgrade to a patched version of Mattermost Server.
You can find more information about CVE-2022-1332 on the Mattermost website at https://mattermost.com/security-updates/