First published: Fri Mar 31 2023(Updated: )
When running in a High Availability configuration, Mattermost fails to sanitize some of the user_updated and post_deleted events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost Server | <7.1.6 | |
Mattermost Mattermost Server | =7.7.1 |
Update Mattermost to version v7.8.0, v7.1.6, v7.7.2, or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1775 is a vulnerability in Mattermost that occurs when running in a High Availability configuration, allowing disclosure of sensitive information to some users.
CVE-2023-1775 has a severity rating of medium (6.5).
Mattermost Server versions up to and excluding 7.1.6, as well as version 7.7.1, are affected by CVE-2023-1775.
CVE-2023-1775 occurs due to the failure of Mattermost to sanitize certain user_updated and post_deleted events in a High Availability configuration, leading to the disclosure of sensitive information.
Yes, Mattermost has released security updates to address the CVE-2023-1775 vulnerability. Please refer to the Mattermost website for more information.