Discourse vulnerable to Cross-site Scripting in local oneboxes
CVE-2023-22468

8.8HIGH

Key Information:

Vendor
Discourse
Status
Vendor
CVE Published:
26 January 2023

Summary

Discourse is an open-source community discussion platform that is vulnerable to cross-site scripting (XSS) attacks in specific versions. Attackers can exploit this vulnerability by embedding malicious URLs in posts, leading to the potential execution of harmful scripts on user browsers. Such attacks can succeed on sites with disabled or overly permissive Content Security Policies (CSP). It is important to note that the default CSP in Discourse mitigates this vulnerability. Users are encouraged to upgrade to patched versions 2.8.13 (stable) or 3.0.0.beta16 (beta) to enhance security. Alternatively, restoring the original CSP settings can serve as a temporary mitigation strategy.

Affected Version(s)

discourse stable < 2.8.14 < stable 2.8.14

discourse beta < 3.0.0.beta16 < beta 3.0.0.beta16

discourse tests-passed < 3.0.0.beta16 < tests-passed 3.0.0.beta16

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.