{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-45316","assignerOrgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","state":"PUBLISHED","assignerShortName":"Mattermost","dateReserved":"2023-12-05T08:22:34.306Z","datePublished":"2023-12-12T08:23:17.299Z","dateUpdated":"2025-05-24T10:26:51.058Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Mattermost","vendor":"Mattermost","versions":[{"lessThanOrEqual":"9.1.2","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"9.0.3","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"8.1.5","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"7.8.14","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"9.2.1","status":"affected","version":"0","versionType":"semver"},{"status":"unaffected","version":"8.1.6"},{"status":"unaffected","version":"9.0.4"},{"status":"unaffected","version":"9.1.3"},{"status":"unaffected","version":"9.2.2"},{"status":"unaffected","version":"7.8.15"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"DoyenSec"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/&lt;telem_run_id&gt; as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to a&nbsp;CSRF attack.</p>"}],"value":"Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/<telem_run_id> as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to a CSRF attack.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352: Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9302f53e-dde5-4bf3-b2f2-a83f91ac0eee","shortName":"Mattermost","dateUpdated":"2023-12-12T08:23:17.299Z"},"references":[{"url":"https://mattermost.com/security-updates"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Update Mattermost Server to versions <span style=\"background-color: rgb(255, 255, 255);\">7.8.15,&nbsp;</span>8.1.6, 9.0.4, 9.1.3, 9.2.2 or higher.</p>"}],"value":"Update Mattermost Server to versions 7.8.15, 8.1.6, 9.0.4, 9.1.3, 9.2.2 or higher.\n\n"}],"source":{"advisory":"MMSA-2023-00245","defect":["https://mattermost.atlassian.net/browse/MM-54363"],"discovery":"EXTERNAL"},"title":"Reflected client side path traversal leading to CSRF in Playbooks","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:21:15.671Z"},"title":"CVE Program Container","references":[{"url":"https://mattermost.com/security-updates","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-24T10:26:19.537169Z","id":"CVE-2023-45316","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-24T10:26:51.058Z"}}]}}