Miggo Logo

CVE-2023-43754:
Mattermost Exposure of Sensitive Information to an Unauthorized Actor vulnerability

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.50215%
Published
11/27/2023
Updated
11/28/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/mattermost/mattermost/server/v8go>= 9.1.0, < 9.1.19.1.1
github.com/mattermost/mattermost/server/v8go>= 9.0.0, < 9.0.29.0.2
github.com/mattermost/mattermost/server/v8go< 8.1.48.1.4
github.com/mattermost/mattermost-server/v6go< 7.8.137.8.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing access control checks during permalink preview generation. The primary suspect is the permalink preview handler (app.GetPermalinkPreview) which would be responsible for channel visibility checks. The medium-confidence entry (app.GetChannel) reflects the possibility that the channel retrieval function might not properly enforce archived channel visibility rules in all contexts. The confidence stems from the vulnerability's description specifically mentioning the missing check during permalink previews, which would typically involve these core channel interaction functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*tt*rmost **ils to ****k w**t**r t** "*llow us*rs to vi*w *r**iv** ***nn*ls" s*ttin* is *n**l** *urin* p*rm*link pr*vi*ws *ispl*y, *llowin* m*m**rs to vi*w p*rm*link pr*vi*ws o* *r**iv** ***nn*ls *v*n i* t** "*llow us*rs to vi*w *r**iv** ***nn*ls" s

Reasoning

T** vuln*r**ility st*ms *rom missin* ****ss *ontrol ****ks *urin* p*rm*link pr*vi*w **n*r*tion. T** prim*ry susp**t is t** p*rm*link pr*vi*w **n*l*r (`*pp.**tP*rm*linkPr*vi*w`) w*i** woul* ** r*sponsi*l* *or ***nn*l visi*ility ****ks. T** m**ium-*on*