Lucene search

K
vulnrichmentMattermostVULNRICHMENT:CVE-2024-5270
HistoryMay 26, 2024 - 1:30 p.m.

CVE-2024-5270 SAML to email switch possible when email signin is disabled

2024-05-2613:30:53
CWE-284
Mattermost
github.com
3
mattermost
saml
email signup
user authentication
personal details
security vulnerability

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Mattermost versions 9.5.x <= 9.5.3, 9.7.x <= 9.7.1, 9.6.x <= 9.6.1 and 8.1.x <= 8.1.12 fail to check if the email signup configuration option is enabled when a user requests to switch from SAML to Email. This allows the user to switch their authentication mail from SAML to email and possibly edit personal details that were otherwise non-editable and provided by the SAML provider.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "mattermost",
    "product": "mattermost_server",
    "versions": [
      {
        "status": "affected",
        "version": "9.5.x",
        "versionType": "semver",
        "lessThanOrEqual": "9.5.3"
      },
      {
        "status": "affected",
        "version": "9.7.x",
        "versionType": "semver",
        "lessThanOrEqual": "9.7.1"
      },
      {
        "status": "affected",
        "version": "9.6.x",
        "versionType": "semver",
        "lessThanOrEqual": "9.6.1"
      },
      {
        "status": "affected",
        "version": "8.1.x",
        "versionType": "semver",
        "lessThanOrEqual": "8.1.12"
      },
      {
        "status": "unaffected",
        "version": "9.8.0"
      },
      {
        "status": "unaffected",
        "version": "9.5.4"
      },
      {
        "status": "unaffected",
        "version": "9.7.2"
      },
      {
        "status": "unaffected",
        "version": "9.6.2"
      },
      {
        "status": "unaffected",
        "version": "8.1.13"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-5270