Lucene search

K
vulnrichmentMattermostVULNRICHMENT:CVE-2024-39777
HistoryAug 01, 2024 - 2:05 p.m.

CVE-2024-39777 Malicious remote can invite itself to an arbitrary local channel

2024-08-0114:05:03
CWE-284
Mattermost
github.com
3
cve-2024-39777
mattermost 9.9.x
mattermost 9.5.x
mattermost 9.7.x
shared channels

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

20.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to disallow unsolicited invites to expose access to local channels, when shared channels are enabled, which allows a malicious remote to send an invite with the ID of an existing local channel, and that local channel will then become shared without the consent of the local admin.

CNA Affected

[
  {
    "vendor": "Mattermost",
    "product": "Mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "9.9.0"
      },
      {
        "status": "affected",
        "version": "9.5.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.5.6"
      },
      {
        "status": "affected",
        "version": "9.7.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.7.5"
      },
      {
        "status": "affected",
        "version": "9.8.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.8.1"
      },
      {
        "status": "unaffected",
        "version": "9.10.0"
      },
      {
        "status": "unaffected",
        "version": "9.9.1"
      },
      {
        "status": "unaffected",
        "version": "9.5.7"
      },
      {
        "status": "unaffected",
        "version": "9.7.6"
      },
      {
        "status": "unaffected",
        "version": "9.8.2"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:mattermost:mattermost:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mattermost",
    "product": "mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "9.9.0"
      },
      {
        "status": "affected",
        "version": "9.5.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.5.6"
      },
      {
        "status": "affected",
        "version": "9.7.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.7.5"
      },
      {
        "status": "affected",
        "version": "9.8.0",
        "versionType": "semver",
        "lessThanOrEqual": "9.8.1"
      },
      {
        "status": "unaffected",
        "version": "9.10.0"
      },
      {
        "status": "unaffected",
        "version": "9.9.1"
      },
      {
        "status": "unaffected",
        "version": "9.5.7"
      },
      {
        "status": "unaffected",
        "version": "9.7.6"
      },
      {
        "status": "unaffected",
        "version": "9.8.2"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

20.1%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-39777