First published: Thu Aug 01 2024(Updated: )
Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5, 9.8.x <= 9.8.1 fail to disallow users to set their own remote username, when shared channels were enabled, which allows a user on a remote to set their remote username prop to an arbitrary string, which would be then synced to the local server as long as the user hadn't been synced before.
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | =9.9.0 | 9.9.1 |
go/github.com/mattermost/mattermost/server/v8 | >=9.8.0<9.8.2 | 9.8.2 |
go/github.com/mattermost/mattermost/server/v8 | >=9.7.0<9.7.6 | 9.7.6 |
go/github.com/mattermost/mattermost/server/v8 | >=9.5.0<9.5.7 | 9.5.7 |
Mattermost | >=9.5.0<9.5.7 | |
Mattermost | >=9.7.0<9.7.6 | |
Mattermost | >=9.8.0<9.8.2 | |
Mattermost | =9.9.0 |
Update Mattermost to versions 9.10.0, 9.9.1, 9.5.7, 9.7.6, 9.8.2 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39839 has a moderate severity level due to the potential for unauthorized users to set arbitrary remote usernames.
To fix CVE-2024-39839, update Mattermost to version 9.9.1, 9.8.2, 9.7.6, or 9.5.7 or later.
CVE-2024-39839 affects Mattermost versions 9.9.0, 9.5.6, 9.7.5, and 9.8.1 and earlier.
The impact of CVE-2024-39839 allows users to set arbitrary remote usernames in shared channels, leading to potential impersonation.
There are no official workarounds for CVE-2024-39839, thus updating to a patched version is the recommended approach.