First published: Fri Jun 16 2023(Updated: )
When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost | >=7.7.0<=7.7.3 | |
Mattermost Mattermost | >=7.8.0<=7.8.2 | |
Mattermost Mattermost | >=7.9.0<=7.9.1 | |
Mattermost Mattermost | =7.10.0 |
Update Mattermost to version v7.7.4, v7.8.3, v7.9.2, v7.10.1, or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2791 is a vulnerability in Mattermost that allows an authenticated attacker to edit an arbitrary channel post when creating a playbook run via the /dialog API.
CVE-2023-2791 affects Mattermost versions 7.7.0 to 7.7.3, 7.8.0 to 7.8.2, 7.9.0 to 7.9.1, and 7.10.0.
CVE-2023-2791 has a severity rating of medium (4.3).
An attacker can exploit CVE-2023-2791 by creating a malicious playbook run via the /dialog API and gaining access to edit arbitrary channel posts.
Yes, Mattermost has released security updates to address CVE-2023-2791. It is recommended to upgrade to the latest version to mitigate the vulnerability.