CVE-2024-4198Improper Access Control in Mattermost Mattermost-server

Severity
2.7LOWNVD
EPSS
0.1%
top 66.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 26
Latest updateJun 5

Description

Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NExploitability: 1.2 | Impact: 1.4

Affected Packages3 packages

NVDmattermost/mattermost_server8.1.08.1.12+2
Gogithub.com/mattermost_mattermost-server9.6.0-rc19.6.1+5
CVEListV5mattermost/mattermost9.5.09.5.2+2

🔴Vulnerability Details

4
OSV
Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server2024-06-05
OSV
Mattermost fails to fully validate role changes2024-04-26
CVEList
CVE-2024-4198: Mattermost versions 92024-04-26
GHSA
Mattermost fails to fully validate role changes2024-04-26

📋Vendor Advisories

1
Red Hat
mattermost: fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest2024-04-26
CVE-2024-4198 — Improper Access Control | cvebase