Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://mattermost.com/security-updates/ |
![]() ![]() |
History
Fri, 06 Dec 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Mattermost
Published:
Updated: 2024-12-06T23:00:50.221Z
Reserved: 2023-05-18T11:58:33.058Z
Link: CVE-2023-2788

Updated: 2024-08-02T06:33:05.778Z

Status : Modified
Published: 2023-06-16T09:15:09.993
Modified: 2024-11-21T07:59:17.493
Link: CVE-2023-2788

No data.