Mattermost versions 9.8.x <= 9.8.0, 9.7.x <= 9.7.4, 9.6.x <= 9.6.2 and 9.5.x <= 9.5.5, when shared channels are enabled, fail to use constant time comparison for remote cluster tokens which allows an attacker to retrieve the remote cluster token via a timing attack during remote cluster token comparison.
References
Link | Resource |
---|---|
https://mattermost.com/security-updates | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Jul 2024, 17:08
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
First Time |
Mattermost mattermost
Mattermost |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:* | |
References | () https://mattermost.com/security-updates - Vendor Advisory |
03 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-03 09:15
Updated : 2024-07-05 17:08
NVD link : CVE-2024-39830
Mitre link : CVE-2024-39830
JSON object : View
Products Affected
mattermost
- mattermost
CWE
CWE-203
Observable Discrepancy