Lucene search

K
vulnrichmentMattermostVULNRICHMENT:CVE-2024-36255
HistoryMay 26, 2024 - 1:32 p.m.

CVE-2024-36255 Post actions can run playbook checklist task commands

2024-05-2613:32:56
CWE-352
Mattermost
github.com
9
cve-2024-36255
mattermost
post actions
input validation
playbook checklist task commands
deceptive post action
slash command
arbitrary channel

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Mattermost versions 9.5.x <= 9.5.3, 9.6.x <= 9.6.1 and 8.1.x <= 8.1.12 fail to perform proper input validation on post actions which allows an attacker to run a playbook checklist task command as another user via creating and sharing a deceptive post action that unexpectedly runs a slash command in some arbitrary channel.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:mattermost:mattermost:9.5.3:*:*:*:*:*:*:*"
    ],
    "vendor": "mattermost",
    "product": "mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "9.5.x",
        "versionType": "custom",
        "lessThanOrEqual": "9.5.3"
      }
    ],
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:2.3:a:mattermost:mattermost:9.6.1:*:*:*:*:*:*:*"
    ],
    "vendor": "mattermost",
    "product": "mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "9.6.x",
        "versionType": "custom",
        "lessThanOrEqual": "9.6.1"
      }
    ],
    "defaultStatus": "affected"
  },
  {
    "cpes": [
      "cpe:2.3:a:mattermost:mattermost:8.1.12:*:*:*:*:*:*:*"
    ],
    "vendor": "mattermost",
    "product": "mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "8.1.x",
        "versionType": "custom",
        "lessThanOrEqual": "8.1.12"
      }
    ],
    "defaultStatus": "affected"
  }
]

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-36255