First published: Mon Nov 27 2023(Updated: )
Mattermost fails to properly check a redirect URL parameter allowing for an open redirect was possible when the user clicked "Back to Mattermost" after providing a invalid custom url scheme in /oauth/{service}/mobile_login?redirect_to=
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-server/v6 | <7.8.13 | 7.8.13 |
go/github.com/mattermost/mattermost/server/v8 | <8.1.4 | 8.1.4 |
go/github.com/mattermost/mattermost/server/v8 | >=9.0.0<9.0.2 | 9.0.2 |
go/github.com/mattermost/mattermost/server/v8 | >=9.1.0<9.1.1 | 9.1.1 |
Mattermost Mattermost | <=7.8.12 | |
Mattermost Mattermost | >=8.0.0<=8.1.3 | |
Mattermost Mattermost | >=9.0.0<=9.0.1 | |
Mattermost Mattermost | =9.1.0 |
Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47168 is an open redirect vulnerability in Mattermost that allows for unauthorized redirection of users to malicious websites.
The open redirect vulnerability in Mattermost occurs when the user clicks on "Back to Mattermost" after providing an invalid custom URL scheme, allowing for the redirection to an attacker-controlled website.
The severity of CVE-2023-47168 is medium, with a CVSS score of 4.3.
Versions 7.8.13 up to exclusive, 8.1.4 up to exclusive, 9.0.0 up to inclusive exclusive, and 9.1.0 up to inclusive exclusive of Mattermost are affected by CVE-2023-47168.
To fix the open redirect vulnerability, it is recommended to update Mattermost to versions 7.8.13, 8.1.4, 9.0.2, or 9.1.1, depending on the affected version.