First published: Tue Dec 12 2023(Updated: )
Mattermost fails to validate the type of the "reminder" body request parameter allowing an attacker to crash the Playbook Plugin when updating the status dialog.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=7.8.14 | |
Mattermost | >=8.0.0<=8.1.5 | |
Mattermost | >=9.0.0<=9.0.3 | |
Mattermost | >=9.1.0<=9.1.2 | |
Mattermost | >=9.2.0<=9.2.1 | |
Mattermost | =9.1.1 |
Update Mattermost Plugins to versions 9.2.2, 8.1.6, 9.0.4, 9.1.3 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49607 is assigned a severity rating based on its potential impact on the Mattermost server, which may allow service disruption.
To mitigate CVE-2023-49607, you should update your Mattermost server to the latest version that addresses this vulnerability.
CVE-2023-49607 affects Mattermost server versions up to 7.8.14, as well as various versions between 8.0.0 and 9.2.1.
Yes, CVE-2023-49607 can potentially cause a denial of service by crashing the Playbook Plugin when the status dialog is updated.
Yes, a patch for CVE-2023-49607 is included in the latest releases of the Mattermost server, which should be applied immediately.