First published: Fri Aug 11 2023(Updated: )
Mattermost fails to properly validate the requesting user permissions when updating a system admin, allowing a user manager to update a system admin's details such as email, first name and last name.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost | >=7.8.0<7.8.8 | |
Mattermost Mattermost | >=7.9.0<7.9.6 | |
Mattermost Mattermost | >=7.10.0<7.10.4 | |
go/github.com/mattermost/mattermost-server/v6 | >=7.10.0<=7.10.3 | 7.10.4 |
go/github.com/mattermost/mattermost-server/v6 | >=7.9.0<=7.9.5 | 7.9.6 |
go/github.com/mattermost/mattermost-server/v6 | <=7.8.7 | 7.8.8 |
Update Mattermost Server to versions 7.8.8, 7.9.6, 7.10.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4107 is a vulnerability that allows a user manager to update a system admin's details in Mattermost without proper validation of user permissions.
CVE-2023-4107 affects Mattermost by allowing a user manager to update a system admin's details without proper validation of user permissions.
CVE-2023-4107 has a severity rating of medium with a CVSS score of 6.7.
Mattermost versions 7.10.0 to 7.10.3, 7.9.0 to 7.9.5, and 7.8.0 to 7.8.7 are affected by CVE-2023-4107.
To fix CVE-2023-4107, it is recommended to update Mattermost to version 7.10.4, 7.9.6, or 7.8.8.