Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2 and 9.5.x <= 9.5.5, when shared channels are enabled, fail to use constant time comparison for remote cluster tokens which allows an attacker to retrieve the remote cluster token via a timing attack during remote cluster token comparison.
References
Link | Resource |
---|---|
https://mattermost.com/security-updates | Vendor Advisory |
https://mattermost.com/security-updates | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://mattermost.com/security-updates - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
05 Jul 2024, 17:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Mattermost mattermost
Mattermost |
|
References | () https://mattermost.com/security-updates - Vendor Advisory | |
CWE | CWE-203 | |
CPE | cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
03 Jul 2024, 12:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-03 09:15
Updated : 2024-11-21 09:28
NVD link : CVE-2024-39830
Mitre link : CVE-2024-39830
CVE.ORG link : CVE-2024-39830
JSON object : View
Products Affected
mattermost
- mattermost