First published: Wed Jul 03 2024(Updated: )
Mattermost versions 9.5.x <= 9.5.5 and 9.8.0 fail to sanitize the RemoteClusterFrame payloads before audit logging them which allows a high privileged attacker with access to the audit logs to read message contents.
Credit: responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost | >=9.5.0<9.5.6 | |
Mattermost | =9.8.0 |
Update Mattermost to versions 9.9.0, 9.8.1, 9.5.6 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39353 is classified as a high severity vulnerability due to its potential to expose sensitive message contents to high privileged attackers.
To fix CVE-2024-39353, you should upgrade Mattermost to a version higher than 9.5.5 or to 9.8.1 or above.
CVE-2024-39353 affects Mattermost versions 9.5.0 through 9.5.5 and specifically version 9.8.0.
CVE-2024-39353 exploits the failure of Mattermost to sanitize RemoteClusterFrame payloads before auditing, allowing access to sensitive data.
CVE-2024-39353 can impact organizations where high privileged users have access to audit logs, potentially exposing confidential message content.