First published: Tue Oct 29 2024(Updated: )
Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 fail to sanitize user inputs in the frontend that are used for redirection which allows for a one-click client-side path traversal that is leading to CSRF in Playbooks
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20240926115259-20ed58906adc | 8.0.0-20240926115259-20ed58906adc |
Mattermost | >=9.5.0<=9.5.9 | |
Mattermost | >=9.10.0<=9.10.2 | |
Mattermost | >=9.11.0<=9.11.1 |
Update Mattermost to versions 10.0.0, 9.10.3, 9.11.2, 9.5.10 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46872 is considered to have a critical severity due to its potential to facilitate CSRF attacks.
To mitigate CVE-2024-46872, upgrade to Mattermost version 8.0.0-20240926115259-20ed58906adc or later.
CVE-2024-46872 affects Mattermost versions 9.5.0 to 9.5.9, 9.10.0 to 9.10.2, and 9.11.0 to 9.11.1.
CVE-2024-46872 allows for a one-click client-side path traversal that could lead to CSRF attacks.
CVE-2024-46872 is primarily a client-side vulnerability that arises from improper input sanitization.