Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
References
Link | Resource |
---|---|
https://mattermost.com/security-updates/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mattermost
Published: 2023-06-16T08:58:15.392Z
Updated: 2023-06-16T08:58:15.392Z
Reserved: 2023-05-18T11:58:33.058Z
Link: CVE-2023-2788
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-06-16T09:15:09.993
Modified: 2023-06-26T17:47:39.027
Link: CVE-2023-2788
JSON object: View
Redhat Information
No data.