CVE-2023-46701
Inaccessible Post Information Leak via Run Timeline IDOR
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Mattermost fails to perform authorization checks in the /plugins/playbooks/api/v0/runs/add-to-timeline-dialog endpoint of the Playbooks plugin allowing an attacker to get limited information about a post if they know the post ID
Mattermost no realiza comprobaciones de autorización en el endpoint /plugins/playbooks/api/v0/runs/add-to-timeline-dialog del complemento Playbooks, lo que permite a un atacante obtener información limitada sobre una publicación si conoce el ID de la publicación.
*Credits:
vultza (vultza)
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-12-05 CVE Reserved
- 2023-12-12 CVE Published
- 2024-08-02 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://mattermost.com/security-updates | 2023-12-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mattermost Search vendor "Mattermost" | Mattermost Server Search vendor "Mattermost" for product "Mattermost Server" | <= 7.8.14 Search vendor "Mattermost" for product "Mattermost Server" and version " <= 7.8.14" | - |
Affected
| ||||||
Mattermost Search vendor "Mattermost" | Mattermost Server Search vendor "Mattermost" for product "Mattermost Server" | >= 8.0.0 <= 8.1.5 Search vendor "Mattermost" for product "Mattermost Server" and version " >= 8.0.0 <= 8.1.5" | - |
Affected
| ||||||
Mattermost Search vendor "Mattermost" | Mattermost Server Search vendor "Mattermost" for product "Mattermost Server" | >= 9.0.0 <= 9.0.3 Search vendor "Mattermost" for product "Mattermost Server" and version " >= 9.0.0 <= 9.0.3" | - |
Affected
| ||||||
Mattermost Search vendor "Mattermost" | Mattermost Server Search vendor "Mattermost" for product "Mattermost Server" | >= 9.1.1 <= 9.1.2 Search vendor "Mattermost" for product "Mattermost Server" and version " >= 9.1.1 <= 9.1.2" | - |
Affected
| ||||||
Mattermost Search vendor "Mattermost" | Mattermost Server Search vendor "Mattermost" for product "Mattermost Server" | >= 9.2.0 <= 9.2.1 Search vendor "Mattermost" for product "Mattermost Server" and version " >= 9.2.0 <= 9.2.1" | - |
Affected
|