First published: Thu Feb 29 2024(Updated: )
Mattermost fails to properly authorize the requests fetching team associated AD/LDAP groups, allowing a user to fetch details of AD/LDAP groups of a team that they are not a member of.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | >=9.2.0<9.2.5 | 9.2.5 |
go/github.com/mattermost/mattermost/server/v8 | >=9.3.0<9.3.1 | 9.3.1 |
go/github.com/mattermost/mattermost/server/v8 | >=9.4.0<9.4.2 | 9.4.2 |
Mattermost | <8.1.9 | |
Mattermost | >=9.0.0<9.2.5 | |
Mattermost | >=9.4.0<9.4.2 | |
Mattermost | =9.3.0 | |
Mattermost | =9.3.0-rc1 | |
Mattermost | =9.3.0-rc2 |
Update Mattermost Server to versions 9.5.0, 9.4.2, 9.3.1, 9.2.5, 8.1.9 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23493 has not been officially rated, but it allows unauthorized access to Team associated AD/LDAP group details which poses a significant security risk.
To fix CVE-2024-23493, upgrade your Mattermost server to version 9.2.5, 9.3.1, or 9.4.2.
CVE-2024-23493 affects Mattermost server versions up to 8.1.9 and from version 9.0.0 to 9.2.5, as well as from 9.4.0 to 9.4.2.
CVE-2024-23493 allows unauthorized requests to fetch details of AD/LDAP groups associated with teams that a user does not belong to.
The primary risk of CVE-2024-23493 is that it can lead to data exposure of sensitive group information, potentially compromising user privacy and security.