First published: Fri Feb 09 2024(Updated: )
Mattermost Jira Plugin fails to protect against logout CSRF allowing an attacker to post a specially crafted message that would disconnect a user's Jira connection in Mattermost only by viewing the message.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-plugin-jira | <1.1.2-0.20230830170046-f4cf4c6de017 | 1.1.2-0.20230830170046-f4cf4c6de017 |
Mattermost | <=8.1.7 |
Update Mattermost Server to versions 8.1.8 or higher. Alternatively, update the Mattermost Jira Plugin to versions v4.1.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23319 has a medium severity rating due to its potential impact on user sessions.
To fix CVE-2024-23319, ensure you update Mattermost Server to a version higher than 8.1.7 and the Jira plugin to version 1.1.2-0.20230830170046-f4cf4c6de017.
CVE-2024-23319 affects Mattermost Server versions up to 8.1.7 and the Jira plugin versions before 1.1.2-0.20230830170046-f4cf4c6de017.
CVE-2024-23319 enables logout CSRF attacks that can disconnect a user's Jira connection by viewing a crafted message.
Currently, there is no official workaround for CVE-2024-23319 other than applying the recommended updates.