First published: Tue Dec 12 2023(Updated: )
Mattermost fails to check whether a user is a guest when updating the tasks of a private playbook run allowing a guest to update the tasks of a private playbook run if they know the run ID.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | <=7.8.14 | |
Mattermost | >=8.0.0<=8.1.5 | |
Mattermost | >=9.0.0<=9.0.3 | |
Mattermost | >=9.1.1<=9.1.2 | |
Mattermost | >=9.2.0<=9.2.1 |
Update Mattermost Server to versions 9.2.2, 8.1.6, 9.0.4, 9.1.3, 7.8.15 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49874 is considered a medium severity vulnerability.
To fix CVE-2023-49874, update Mattermost Server to version 7.8.15 or later, or to a version in the 8.1.6 or 9.0.4 series and above.
CVE-2023-49874 affects all users of Mattermost Server versions up to 7.8.14 and various versions from 8.0.0 to 9.2.1.
CVE-2023-49874 allows guest users to modify tasks in a private playbook run if they have the run ID, leading to unauthorized access.
There is currently no confirmed workaround for CVE-2023-49874; upgrading to a patched version is recommended.