CVE-2023-45316
12.12.2023, 09:15
Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/<telem_run_id> as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to aCSRF attack.
Vendor | Product | Version |
---|---|---|
mattermost | mattermost_server | 𝑥 ≤ 7.8.14 |
mattermost | mattermost_server | 8.0.0 ≤ 𝑥 ≤ 8.1.5 |
mattermost | mattermost_server | 9.0.0 ≤ 𝑥 ≤ 9.0.3 |
mattermost | mattermost_server | 9.1.1 ≤ 𝑥 ≤ 9.1.2 |
mattermost | mattermost_server | 9.2.0 ≤ 𝑥 ≤ 9.2.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-352 - Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.