First published: Fri Feb 09 2024(Updated: )
Mattermost Jira Plugin handling subscriptions fails to check the security level of an incoming issue or limit it based on the user who created the subscription resulting in registered users on Jira being able to create webhooks that give them access to all Jira issues.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost-plugin-jira | <4.0.0-rc1 | 4.0.0-rc1 |
Mattermost | <=8.1.7 |
Update Mattermost Server to versions 8.1.8 or higher. Alternatively, update the Mattermost Jira Plugin to version 4.0.1 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24774 is considered a critical vulnerability due to its potential to expose all Jira issues to unauthorized users.
To fix CVE-2024-24774, update the Mattermost Jira Plugin to version 4.0.0-rc2 or later, or ensure your Mattermost Server is upgraded to version 8.1.8 or newer.
CVE-2024-24774 affects users of the Mattermost Jira Plugin version up to 4.0.0-rc1 and Mattermost Server versions up to 8.1.7.
CVE-2024-24774 is an access control vulnerability that allows unauthorized access to Jira issues.
Yes, CVE-2024-24774 can lead to data breaches as it allows registered users to access sensitive Jira issue data through created webhooks.