Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2 and 9.5.x <= 9.5.5, when shared channels are enabled, fail to use constant time comparison for remote cluster tokens which allows an attacker to retrieve the remote cluster token via a timing attack during remote cluster token comparison.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-38258 Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2 and 9.5.x <= 9.5.5, when shared channels are enabled, fail to use constant time comparison for remote cluster tokens which allows an attacker to retrieve the remote cluster token via a timing attack during remote cluster token comparison.
Fixes

Solution

Update Mattermost to versions 9.9.0, 9.8.1, 9.7.5, 9.6.3, 9.5.6 or higher.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-08-02T04:26:16.020Z

Reserved: 2024-07-01T10:22:11.595Z

Link: CVE-2024-39830

cve-icon Vulnrichment

Updated: 2024-08-02T04:26:16.020Z

cve-icon NVD

Status : Modified

Published: 2024-07-03T09:15:07.507

Modified: 2024-11-21T09:28:24.507

Link: CVE-2024-39830

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.