CVE-2023-5968: Mattermost password hash disclosure vulnerability
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35389%
CWE
Published
11/6/2023
Updated
11/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/mattermost/mattermost-server/v6 | go | < 7.8.12 | 7.8.12 |
| github.com/mattermost/mattermost/server/v8 | go | >= 8.0.0, < 8.0.4 | 8.0.4 |
| github.com/mattermost/mattermost/server/v8 | go | >= 8.1.0, < 8.1.3 | 8.1.3 |
| github.com/mattermost/mattermost/server/v8 | go | = 9.0.0 | 9.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the vulnerability was fixed by adding newUser.Sanitize() in UpdateUser (user.go), indicating this function previously returned unsanitized user data. The accompanying test updates in user_test.go verify password field emptiness, confirming the exposure vector. PatchUser's test modifications further validate the fix's scope. CWE-200 aligns with the unsanitized sensitive data exposure in the response.