{ "id": "CVE-2024-36255", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-05-26T14:15:10.060", "lastModified": "2024-05-28T12:39:28.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost versions 9.5.x <= 9.5.3, 9.6.x <= 9.6.1 and 8.1.x <= 8.1.12 fail to perform proper input validation on post actions which allows an attacker to run a playbook checklist task command as another user via creating and sharing a deceptive post action that unexpectedly runs a slash command in some arbitrary channel." }, { "lang": "es", "value": "Las versiones de Mattermost 9.5.x <= 9.5.3, 9.6.x <= 9.6.1 y 8.1.x <= 8.1.12 no realizan una validaci\u00f3n de entrada adecuada en las acciones posteriores, lo que permite a un atacante ejecutar un comando de tarea de lista de verificaci\u00f3n del libro de jugadas como otro usuario creando y compartiendo una acci\u00f3n de publicaci\u00f3n enga\u00f1osa que ejecuta inesperadamente un comando de barra diagonal en alg\u00fan canal arbitrario." } ], "metrics": { "cvssMetricV31": [ { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.1, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "references": [ { "url": "https://mattermost.com/security-updates", "source": "responsibledisclosure@mattermost.com" } ] }