CVE-2022-21684
Published Jan 13, 2022
Last updated a year ago
Overview
- Description
- Discourse is an open source discussion platform. Versions prior to 2.7.13 in `stable`, 2.8.0.beta11 in `beta`, and 2.8.0.beta11 in `tests-passed` allow some users to log in to a community before they should be able to do so. A user invited via email to a forum with `must_approve_users` enabled is going to be automatically logged in, bypassing the check that does not allow unapproved users to sign in. They will be able to do everything an approved user can do. If they logout, they cannot log back in. This issue is patched in the `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11. One may disable invites as a workaround. Administrators can increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 6.4
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "131D6FC3-2C60-4524-9B4E-F8316312A606", "versionEndExcluding": "2.7.13" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E7F8AC4-35D1-45E5-8A3A-B0205000A5D3" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A24507D-6D4B-4992-BCFE-232AF3BFCC30" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9AE12FE-0396-4843-8D30-D8C44FAE01DA" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F101AEAB-4FB7-4BE3-931B-595702D616C7" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6878B7F-2691-4D3F-8116-CB282FDAAAC7" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76EABAB9-BEA4-48D4-ADBA-D00746B29C52" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82A255A2-4658-41AD-A4DE-A7F8D018028D" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5804585-2EA4-4677-8EC1-5F561D5C7D7A" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "082A6871-080A-4AA7-AF4A-D664EA46488A" }, { "criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A280205-A2DC-4E30-937B-5564C779FD5A" } ], "operator": "OR" } ] } ]