First published: Thu Feb 29 2024(Updated: )
A race condition in Mattermost versions 8.1.x before 8.1.9, and 9.4.x before 9.4.2 allows an authenticated attacker to gain unauthorized access to individual posts' contents via carefully timed post creation while another user deletes posts.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | <8.1.9 | 8.1.9 |
go/github.com/mattermost/mattermost/server/v8 | >=9.0.0<9.4.2 | 9.4.2 |
Mattermost | >=8.1.0<8.1.9 | |
Mattermost | >=9.4.0<9.4.2 |
Update Mattermost Server to versions 9.5 ( 2024), 9.4.2, 8.1.9 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1949 affects Mattermost versions 8.1.x before 8.1.9 and 9.4.x before 9.4.2.
The severity of CVE-2024-1949 is significant as it allows authenticated attackers to gain unauthorized access to the contents of individual posts.
To fix CVE-2024-1949, upgrade to Mattermost version 8.1.9 or 9.4.2 or later.
CVE-2024-1949 is classified as a race condition vulnerability.
CVE-2024-1949 requires authentication, meaning it cannot be exploited remotely by an unauthenticated attacker.