Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
References
Link | Resource |
---|---|
https://mattermost.com/security-updates/ | Vendor Advisory |
https://mattermost.com/security-updates/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.2 |
References | () https://mattermost.com/security-updates/ - Vendor Advisory |
26 Jun 2023, 17:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:* cpe:2.3:a:mattermost:mattermost:7.10.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Mattermost mattermost
Mattermost |
|
References | (MISC) https://mattermost.com/security-updates/ - Vendor Advisory | |
CWE | CWE-613 |
16 Jun 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-16 09:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2788
Mitre link : CVE-2023-2788
CVE.ORG link : CVE-2023-2788
JSON object : View
Products Affected
mattermost
- mattermost