CVE-2023-6727

Mattermost fails to perform correct authorization checks when creating a playbook action, allowing users without access to the playbook to create playbook actions. If the playbook action created is to post a message in a channel based on specific keywords in a post, some playbook information, like the name, can be leaked. 
References
Link Resource
https://mattermost.com/security-updates Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*

History

15 Dec 2023, 14:43

Type Values Removed Values Added
CPE cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*
Summary
  • (es) Mattermost no realiza comprobaciones de autorización correctas al crear una acción del playbook, lo que permite a los usuarios sin acceso al playbook crear acciones del playbook. Si la acción del playbook creada es publicar un mensaje en un canal basado en palabras clave específicas en una publicación, se puede filtrar cierta información del playbook, como el nombre.
First Time Mattermost
Mattermost mattermost Server
References () https://mattermost.com/security-updates - () https://mattermost.com/security-updates - Issue Tracking, Vendor Advisory
CVSS v2 : unknown
v3 : 3.1
v2 : unknown
v3 : 4.3
CWE NVD-CWE-noinfo

12 Dec 2023, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-12 11:15

Updated : 2023-12-15 14:43


NVD link : CVE-2023-6727

Mitre link : CVE-2023-6727

CVE.ORG link : CVE-2023-6727


JSON object : View

Products Affected

mattermost

  • mattermost_server
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor