First published: Fri Jun 14 2024(Updated: )
Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system via custom URI schemes.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/mattermost-desktop | <5.8.0 | 5.8.0 |
Mattermost Mattermost Desktop | <=5.7.0 |
Update Mattermost Desktop App to versions 5.8.0 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-37182 is classified as high due to the potential for remote code execution.
To fix CVE-2024-37182, upgrade to Mattermost Desktop App version 5.8.0 or later.
CVE-2024-37182 affects Mattermost Desktop App versions 5.7.0 and earlier.
Yes, CVE-2024-37182 allows a remote attacker to exploit the application and potentially execute arbitrary code on the victim's system.
CVE-2024-37182 can be exploited via custom URI schemes that the application does not properly handle.