Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2547 Mattermost versions 9.9.x <= 9.9.0 and 9.5.x <= 9.5.6 fail to validate the source of sync messages and only allow the correct remote IDs, which allows a malicious remote to set arbitrary RemoteId values for synced users and therefore claim that a user was synced from another remote.
Github GHSA Github GHSA GHSA-9fpw-c9x7-cv3j Mattermost allows remote actor to set arbitrary RemoteId values for synced users
Fixes

Solution

Update Mattermost to versions 9.10.0, 9.9.1, 9.5.7 or higher.


Workaround

No workaround given by the vendor.

References
History

Wed, 04 Sep 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Mattermost
Mattermost mattermost Server
Weaknesses CWE-346
CPEs cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:9.9.0:*:*:*:*:*:*:*
Vendors & Products Mattermost
Mattermost mattermost Server

cve-icon MITRE

Status: PUBLISHED

Assigner: Mattermost

Published:

Updated: 2024-08-01T14:32:10.107Z

Reserved: 2024-07-23T18:35:14.800Z

Link: CVE-2024-41926

cve-icon Vulnrichment

Updated: 2024-08-01T14:32:04.183Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-01T15:15:13.900

Modified: 2024-09-04T16:55:35.570

Link: CVE-2024-41926

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.