CVE-2024-41926Improper Access Control in Mattermost Mattermost

Severity
4.3MEDIUMNVD
CNA2.7
EPSS
0.2%
top 62.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 1
Latest updateAug 6

Description

Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages5 packages

NVDmattermost/mattermost_server9.5.09.5.7+1
Gogithub.com/mattermost_mattermost< 5.3.2-0.20240604093018-5114c3b7cdb8
Gogithub.com/mattermost_mattermost-server9.5.0+incompatible9.5.7+incompatible+1
CVEListV5mattermost/mattermost9.5.09.5.6+1

🔴Vulnerability Details

4
OSV
Mattermost allows remote actor to set arbitrary RemoteId values for synced users in github.com/mattermost/mattermost-server2024-08-06
GHSA
Mattermost allows remote actor to set arbitrary RemoteId values for synced users2024-08-01
CVEList
Malicious remote can claim that a user was synced from another remote2024-08-01
OSV
Mattermost allows remote actor to set arbitrary RemoteId values for synced users2024-08-01
CVE-2024-41926 — Improper Access Control | cvebase