First published: Fri Jun 16 2023(Updated: )
Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost | >=7.1.0<=7.1.9 | |
Mattermost Mattermost | >=7.8.0<=7.8.4 | |
Mattermost Mattermost | >=7.9.0<=7.9.3 | |
Mattermost Mattermost | =7.10.0 |
Update Mattermost to version v7.1.10, v7.8.5, v7.9.4, v7.10.1, or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Mattermost vulnerability is CVE-2023-2787.
The severity of CVE-2023-2787 is medium with a CVSS score of 6.5.
Mattermost fails to check channel membership when accessing message threads by not verifying if the user is a member of the channel before granting access to message threads.
An attacker can access arbitrary posts by using the message threads API, bypassing the required channel membership check.
Versions 7.1.0 to 7.1.9, 7.8.0 to 7.8.4, 7.9.0 to 7.9.3, and 7.10.0 of Mattermost are affected by this vulnerability.
To fix CVE-2023-2787, it is recommended to upgrade to a version of Mattermost that is not affected by this vulnerability, as provided in the official security updates.