{"id":"CVE-2019-20844","details":"An issue was discovered in Mattermost Server before 5.18.0, 5.17.2, 5.16.4, 5.15.4, and 5.9.7. An attacker can spoof a direct-message channel by changing the type of a channel.","modified":"2026-02-24T11:32:42.102583Z","published":"2020-06-19T14:15:10.510Z","references":[{"type":"ADVISORY","url":"https://mattermost.com/security-updates/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost","events":[{"introduced":"6597fdb40134965e26f715854dc85f5e6cfaa6df"},{"fixed":"e16012435f82afafdfdd7963e95d86c9e8538322"}]}],"versions":["v5.16.0","v5.16.0-rc3","v5.16.1","v5.16.1-rc1","v5.16.1-rc2","v5.16.2","v5.16.2-rc1","v5.16.3","v5.16.3-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20844.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mattermost/mattermost-server","events":[{"introduced":"0"},{"fixed":"8017e8f6089403453fc428bf520b1ccdcb3e8c3c"},{"introduced":"68b0b52fc86534e161e62eda78c5820ef799bc70"},{"fixed":"e16012435f82afafdfdd7963e95d86c9e8538322"},{"introduced":"c81e4f87c20a717b1dc52b2b77780fa789e19148"},{"fixed":"838959532a1c8d1eb6a8d93b582fe4af52990870"},{"introduced":"f4f7fd0829d74fcd5e290fd1ba76845af18e553e"},{"fixed":"5e4a58386b711b3acb6e522ba3a1ecf7e50d80e5"}]}],"versions":["v5.15.0","v5.15.0-rc4","v5.15.1","v5.15.1-rc1","v5.15.2","v5.15.2-rc1","v5.15.2-rc2","v5.15.3","v5.15.3-rc1","v5.15.4","v5.15.4-rc1","v5.15.5","v5.15.5-rc1","v5.17.0","v5.17.0-rc3","v5.17.0-rc4","v5.17.1","v5.17.1-rc1","v5.17.2","v5.17.3","v5.17.3-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20844.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}