CVE-2024-46872

4.6 MEDIUM

📋 TL;DR

Mattermost fails to sanitize user inputs in the frontend that are used for redirection, allowing a one-click client-side path traversal that leads to Cross-Site Request Forgery (CSRF) in Playbooks. This vulnerability affects Mattermost versions 9.10.x up to 9.10.2, 9.11.x up to 9.11.1, and 9.5.x up to 9.5.9. Attackers can trick authenticated users into performing unintended actions in Playbooks via malicious links.

💻 Affected Systems

Products:
  • Mattermost
Versions: 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9
Operating Systems: All platforms running Mattermost
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Playbooks functionality within Mattermost. Requires user interaction (clicking malicious link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could perform unauthorized actions in Playbooks on behalf of authenticated users, potentially modifying workflows, deleting data, or escalating privileges within the Mattermost instance.

🟠

Likely Case

Attackers trick users into clicking malicious links that perform unwanted actions in Playbooks, such as modifying tasks or changing settings without user consent.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail, preventing unauthorized actions even if users click malicious links.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (one-click) and authenticated user session. Attack vector is through malicious links targeting Playbooks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.10.3, 9.11.2, 9.5.10

Vendor Advisory: https://mattermost.com/security-updates

Restart Required: Yes

Instructions:

1. Backup your Mattermost instance. 2. Download and install the patched version (9.10.3, 9.11.2, or 9.5.10). 3. Restart the Mattermost service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Playbooks

all

Temporarily disable Playbooks functionality to prevent exploitation

Edit config.json: set "EnablePlaybooks" to false
Restart Mattermost service

Implement WAF Rules

all

Add web application firewall rules to block suspicious redirection patterns

Add WAF rule to detect and block path traversal attempts in redirect parameters

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirections
  • Educate users about not clicking untrusted links in Mattermost

🔍 How to Verify

Check if Vulnerable:

Check Mattermost version via System Console > About or run: mattermost version

Check Version:

mattermost version

Verify Fix Applied:

Verify version is 9.10.3, 9.11.2, or 9.5.10 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in access logs
  • Multiple failed Playbooks actions from same user session

Network Indicators:

  • Suspicious outbound redirects from Mattermost instance
  • Unexpected Playbooks API calls

SIEM Query:

source="mattermost" AND (url="*redirect*" OR action="playbook*") AND status=200

🔗 References

📤 Share & Export