Mattermost Server < 7.8.8 / 7.9.x < 7.9.6 / 7.10.x < 7.10.4 Multiple Vulnerabilities

high Nessus Plugin ID 179920

Synopsis

A web application running on the remote server is affected by multiple vulnerabilities.

Description

The version of Mattermost Server running on the remote host is prior to 7.8.8, 7.9.x prior to 7.9.6 or 7.10.x prior to 7.10.4. It is, therefore, affected by multiple vulnerabilities:

- Mattermost fails to sanitize post metadata during audit logging resulting in permalinks contents being logged. (CVE-2023-4108)

- Mattermost fails to properly validate the requesting user permissions when updating a system admin, allowing a user manager to update a system admin's details such as email, first name and last name.
(CVE-2023-4107)

- Mattermost fails to check if the requesting user is a guest before performing different actions to public playbooks, resulting a guest being able to view, join, edit, export and archive public playbooks.
(CVE-2023-4106)

- Mattermost fails to delete the attachments when deleting a message in a thread allowing a simple user to still be able to access and download the attachment of a deleted message. (CVE-2023-4105)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Mattermost Server version 7.8.8, 7.9.6, 7.10.4 or later.

See Also

https://mattermost.com/security-updates/

Plugin Details

Severity: High

ID: 179920

File Name: mattermost_server_7_10_4.nasl

Version: 1.4

Type: remote

Family: CGI abuses

Published: 8/17/2023

Updated: 8/31/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-4108

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mattermost:mattermost_server

Required KB Items: installed_sw/Mattermost Server

Exploit Ease: No known exploits are available

Patch Publication Date: 7/12/2023

Vulnerability Publication Date: 8/11/2023

Reference Information

CVE: CVE-2023-4105, CVE-2023-4106, CVE-2023-4107, CVE-2023-4108

IAVA: 2023-A-0424-S