URL Redirection to Untrusted Site ('Open Redirect') Affecting github.com/mattermost/mattermost-server/v6 package, versions <7.8.13


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about URL Redirection to Untrusted Site ('Open Redirect') vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMMATTERMOSTMATTERMOSTSERVERV6-6094996
  • published29 Nov 2023
  • disclosed27 Nov 2023
  • creditUnknown

Introduced: 27 Nov 2023

CVE-2023-47168  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade github.com/mattermost/mattermost-server/v6 to version 7.8.13 or higher.

Overview

github.com/mattermost/mattermost-server/v6 is an open source, private cloud, Slack-alternative.

Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') due to the improper validation of a redirect URL parameter, an attacker can manipulate the redirection process to lead users to unintended and potentially malicious websites by providing an invalid custom URL scheme in the /oauth/{service}/mobile_login?redirect_to= endpoint. This is only exploitable if the user clicks on the "Back to Mattermost" button after the invalid custom URL scheme has been provided.

CVSS Scores

version 3.1