Arbitrary JavaScript Execution Vulnerability Affects Discourse Sites Without CSP
CVE-2024-35234
6.1MEDIUM
Summary
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the stable
branch and version 3.3.0.beta3 on the tests-passed
branch, an attacker can execute arbitrary JavaScript on users’ browsers by posting a specific URL containing maliciously crafted meta tags. This issue only affects sites with Content Security Polic (CSP) disabled. The problem has been patched in version 3.2.3 on the stable
branch and version 3.3.0.beta3 on the tests-passed
branch. As a workaround, ensure CSP is enabled on the forum.
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published