Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
References
Link Resource
https://mattermost.com/security-updates/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Mattermost

Published: 2023-06-16T08:58:15.392Z

Updated: 2023-06-16T08:58:15.392Z

Reserved: 2023-05-18T11:58:33.058Z


Link: CVE-2023-2788

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-06-16T09:15:09.993

Modified: 2023-06-26T17:47:39.027


Link: CVE-2023-2788

JSON object: View

cve-icon Redhat Information

No data.