CVE-2024-43813

Mattermost versions 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 fail to enforce proper access controls which allows any authenticated user, including guests, to mark any channel inside any team as read for any user.
References
Link Resource
https://mattermost.com/security-updates Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*

History

23 Aug 2024, 15:35

Type Values Removed Values Added
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Vendor Advisory
CPE cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Mattermost mattermost
Mattermost

22 Aug 2024, 12:48

Type Values Removed Values Added
Summary
  • (es) Las versiones 9.5.x &lt;= 9.5.7, 9.10.x &lt;= 9.10.0 de Mattermost no aplican controles de acceso adecuados que permiten a cualquier usuario autenticado, incluidos los invitados, marcar cualquier canal dentro de cualquier equipo como leído para cualquier usuario.

22 Aug 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-22 07:15

Updated : 2024-08-23 15:35


NVD link : CVE-2024-43813

Mitre link : CVE-2024-43813

CVE.ORG link : CVE-2024-43813


JSON object : View

Products Affected

mattermost

  • mattermost
CWE
NVD-CWE-Other CWE-284

Improper Access Control