First published: Thu Sep 26 2024(Updated: )
Mattermost does not strip `embeds` from `metadata` when broadcasting `posted` events. This allows users to include arbitrary embeds in posts, which are then broadcasted via websockets. This can be exploited in many ways, for example to create permalinks with fully customizable content or to trigger a client Side Denial of Service (DoS) by sending a permalink with a non-string message. The advisory metadata references the appropriate go pseudo version available from pkg.go.dev
Credit: responsibledisclosure@mattermost.com responsibledisclosure@mattermost.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mattermost Mattermost Server | >=9.5.0<9.5.9 | |
Mattermost Mattermost Server | =9.11.0 | |
Mattermost Mattermost Server | =9.11.0-rc1 | |
Mattermost Mattermost Server | =9.11.0-rc2 | |
Mattermost Mattermost Server | =9.11.0-rc3 | |
go/github.com/mattermost/mattermost/server/v8 | <8.0.0-20240806094731-69a8b3df0f9f | 8.0.0-20240806094731-69a8b3df0f9f |
Update Mattermost to versions 10.0.0, 9.11.1, 9.5.9 or higher.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47003 has a moderate severity rating due to the potential for arbitrary content embedding in posts.
To fix CVE-2024-47003, upgrade to Mattermost Server version 8.0.0-20240806094731-69a8b3df0f9f or later.
CVE-2024-47003 affects Mattermost Server versions 9.5.0 to 9.5.9 and version 9.11.0.
CVE-2024-47003 can enable users to create permalinks with customizable content through arbitrary embeds in posts.
Yes, CVE-2024-47003 can be exploited via websockets, allowing the broadcast of malicious embeds.