Description
Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote.
Published: 2024-08-01
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update Mattermost to versions 9.10.0, 9.9.1, 9.5.7 or higher.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2547 Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote.
Github GHSA Github GHSA GHSA-9fpw-c9x7-cv3j Mattermost allows remote actor to set arbitrary RemoteId values for synced users
References
History

Wed, 04 Sep 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
Weaknesses CWE-346
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:9.9.0:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

Subscriptions

Mattermost Mattermost Server
cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-08-01T14:32:10.107Z

Reserved: 2024-07-23T18:35:14.800Z

Link: CVE-2024-41926

cve-icon Vulnrichment

Updated: 2024-08-01T14:32:04.183Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-01T15:15:13.900

Modified: 2024-09-04T16:55:35.570

Link: CVE-2024-41926

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses