Discourse is an open source platform for community discussion. Versions prior to 2.8.13 (stable), 3.0.0.beta16 (beta) and 3.0.0beta16 (tests-passed), are vulnerable to cross-site Scripting. A maliciously crafted URL can be included in a post to carry out cross-site scripting attacks on sites with disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. This vulnerability is patched in versions 2.8.13 (stable), 3.0.0.beta16 (beta) and 3.0.0beta16 (tests-passed). As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-8mr2-xf8r-wr8m | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-01-26 13:18
Updated : 2023-02-06 07:19
NVD link : CVE-2023-22468
Mitre link : CVE-2023-22468
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
discourse
- discourse