CVE-2024-11599

8.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass email domain restrictions in Mattermost by submitting specially crafted email addresses during registration. Affected organizations are those running vulnerable Mattermost versions with email domain restrictions configured.

💻 Affected Systems

Products:
  • Mattermost
Versions: 10.0.x <= 10.0.1, 10.1.x <= 10.1.1, 9.11.x <= 9.11.3, 9.5.x <= 9.5.11
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if email domain restrictions are configured. Default installations without domain restrictions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users from prohibited domains gain access to the Mattermost instance, potentially leading to data exposure, privilege escalation, or further attacks within the organization's collaboration platform.

🟠

Likely Case

Attackers bypass email domain restrictions to create accounts, enabling them to access internal communications and potentially phish legitimate users.

🟢

If Mitigated

With proper monitoring and access controls, impact is limited to unauthorized account creation which can be detected and remediated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of email validation bypass techniques but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.2, 10.1.2, 9.11.4, 9.5.12

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup Mattermost data and configuration. 2. Download patched version from Mattermost downloads page. 3. Stop Mattermost service. 4. Install patched version. 5. Restart Mattermost service. 6. Verify version and functionality.

🔧 Temporary Workarounds

Disable Email Registration

all

Temporarily disable email-based user registration to prevent exploitation

Edit config.json: set 'EnableSignUpWithEmail' to false
Restart Mattermost service

Enable Additional Authentication

all

Require additional authentication methods like SSO or LDAP

Configure SSO/LDAP in Mattermost System Console
Disable local email authentication

🧯 If You Can't Patch

  • Implement network-level restrictions to limit registration attempts
  • Enable detailed logging of registration attempts and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About Mattermost or run: mattermost version

Check Version:

mattermost version

Verify Fix Applied:

Verify version is patched (10.0.2, 10.1.2, 9.11.4, or 9.5.12) and test email registration with malformed addresses

📡 Detection & Monitoring

Log Indicators:

  • Unusual registration attempts with non-standard email formats
  • Successful registrations from previously restricted domains

Network Indicators:

  • Spike in registration requests
  • Registration attempts with malformed email addresses

SIEM Query:

source="mattermost" AND (event="user_created" OR event="user_registered") AND email="*@*"

🔗 References

📤 Share & Export