cve/2024/CVE-2024-2450.md
2025-09-29 21:09:30 +02:00

23 lines
1.2 KiB
Markdown

### [CVE-2024-2450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2450)
![](https://img.shields.io/static/v1?label=Product&message=Mattermost&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=9.5.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%3A%20Improper%20Authentication&color=brightgreen)
### Description
Mattermost versions 8.1.x before 8.1.10, 9.2.x before 9.2.6, 9.3.x before 9.3.2, and 9.4.x before 9.4.3 fail to correctly verify account ownership when switching from email to SAML authentication, allowing an authenticated attacker to take over other user accounts via a crafted switch request under specific conditions.
### POC
#### Reference
- https://mattermost.com/security-updates
#### Github
No PoCs found on GitHub currently.