First published: Mon Nov 27 2023(Updated: )
Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user to get their information (e.g. name, surname, nickname) via Mattermost Boards.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-server/v6 | <7.8.13 | 7.8.13 |
go/github.com/mattermost/mattermost/server/v8 | <8.1.4 | 8.1.4 |
go/github.com/mattermost/mattermost/server/v8 | >=9.0.0<9.0.2 | 9.0.2 |
go/github.com/mattermost/mattermost/server/v8 | >=9.1.0<9.1.1 | 9.1.1 |
Mattermost Mattermost | <=7.8.12 | |
Mattermost Mattermost | >=8.0.0<=8.1.3 |
Update Mattermost Server to versions 9.0.2, 9.1.1, 7.8.13, 8.1.4 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6202 is a vulnerability that allows an attacker who is a guest user and knows the ID of another user to get their information via Mattermost Boards.
CVE-2023-6202 has a severity of 4.3 (medium).
CVE-2023-6202 affects Mattermost server versions 7.8.13, 8.1.4, 9.0.2, and 9.1.1.
An attacker who is a guest user and knows the ID of another user can exploit CVE-2023-6202 by accessing their information via Mattermost Boards.
Yes, the fix for CVE-2023-6202 is to update Mattermost server to version 7.8.14, 8.1.5, 9.0.3, or 9.1.2.