CVE-2023-6727

Mattermost fails to perform correct authorization checks when creating a playbook action, allowing users without access to the playbook to create playbook actions. If the playbook action created is to post a message in a channel based on specific keywords in a post, some playbook information, like the name, can be leaked. 
References
Link Resource
https://mattermost.com/security-updates Issue Tracking Vendor Advisory
https://mattermost.com/security-updates Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 3.1
References () https://mattermost.com/security-updates - Issue Tracking, Vendor Advisory () https://mattermost.com/security-updates - Issue Tracking, Vendor Advisory

15 Dec 2023, 14:43

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 11:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6727

Mitre link : CVE-2023-6727

CVE.ORG link : CVE-2023-6727


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo