Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2, and 9.5.x <= 9.5.5 fail to use constant-time comparison for remote cluster tokens, enabling attackers to retrieve the remote cluster token via a timing attack
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2024-39830 Timing attack during remote cluster token comparison when shared channels are enabled | 3 Jul 202408:32 | – | cvelist |
![]() | Improper Authentication | 4 Jul 202409:32 | – | veracode |
![]() | CVE-2024-39830 Timing attack during remote cluster token comparison when shared channels are enabled | 3 Jul 202408:32 | – | vulnrichment |
![]() | CVE-2024-39830 | 3 Jul 202409:15 | – | cve |
![]() | CVE-2024-39830 | 3 Jul 202409:15 | – | osv |
![]() | Mattermost Improper Authorization Vulnerability | 4 Jul 202400:00 | – | cnvd |
Source | Link |
---|---|
mattermost | www.mattermost.com/security-updates |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo