CVE-2023-2784: Affecting Mattermost up to 7.9.3, this flaw allows regular users to send unauthorized install requests due to a failure in sysadmin verification.
This CVE-2023-2784 was assigned by Mattermost and published on June 16, 2023. It affects the Mattermost App Framework versions up to 7.9.3, allowing regular users to send install requests to the Apps due to a failure in verifying if the requester is a sysadmin or not.
Understanding CVE-2023-2784
This section provides insights into the nature of CVE-2023-2784 and its implications.
What is CVE-2023-2784?
CVE-2023-2784 indicates a vulnerability in the Mattermost App Framework where the system fails to verify whether the requester is a sysadmin before allowing
install
requests to the Apps, enabling regular users to send such install requests.
The Impact of CVE-2023-2784
The vulnerability has a CVSSv3.1 base score of 4.2 (Medium severity) with a high attack complexity, network-based attack vector, and low impact on availability. It allows unauthorized regular users to perform actions meant for sysadmins, potentially leading to unauthorized app installations.
Technical Details of CVE-2023-2784
This section delves into the technical aspects of CVE-2023-2784.
Vulnerability Description
The vulnerability, categorized as CWE-862 (Missing Authorization), arises from the failure to verify the sysadmin status before processing
install
requests to the Apps.
Affected Systems and Versions
The following versions of the Mattermost App Framework are impacted:
Exploitation Mechanism
Attackers can exploit this vulnerability by sending
install
requests to Apps without proper authorization, leveraging the lack of verification of sysadmin status.
Mitigation and Prevention
Protecting systems against CVE-2023-2784 involves taking immediate steps and implementing long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates