Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2 and 9.5.x <= 9.5.5, when shared channels are enabled, fail to use constant time comparison for remote cluster tokens which allows an attacker to retrieve the remote cluster token via a timing attack during remote cluster token comparison.
References
| Link | Resource |
|---|---|
| https://mattermost.com/security-updates | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Jul 2024, 17:08
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-203 | |
| First Time |
Mattermost mattermost
Mattermost |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
| CPE | cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:* | |
| References | () https://mattermost.com/security-updates - Vendor Advisory |
03 Jul 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-03 09:15
Updated : 2024-07-05 17:08
NVD link : CVE-2024-39830
Mitre link : CVE-2024-39830
JSON object : View
Products Affected
mattermost
- mattermost
CWE
CWE-203
Observable Discrepancy
