Overview
- Description
- Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, an attacker can execute arbitrary JavaScript on users’ browsers by posting a specific URL containing maliciously crafted meta tags. This issue only affects sites with Content Security Polic (CSP) disabled. The problem has been patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch. As a workaround, ensure CSP is enabled on the forum.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "vulnerable": true, "matchCriteriaId": "8F15A89F-6283-4B24-801E-E415FF5A4272", "versionEndExcluding": "3.2.3" }, { "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*", "vulnerable": true, "matchCriteriaId": "4EBDB0A9-6C68-4FC5-81CD-5E1B042DD60C", "versionEndExcluding": "3.3.0" }, { "criteria": "cpe:2.3:a:discourse:discourse:3.3.0:beta1:*:*:beta:*:*:*", "vulnerable": true, "matchCriteriaId": "4FE1C6B5-D21B-46CC-A889-EECE10A7130A" }, { "criteria": "cpe:2.3:a:discourse:discourse:3.3.0:beta2:*:*:beta:*:*:*", "vulnerable": true, "matchCriteriaId": "51C031F6-729E-4560-B33D-382177F2DB7D" } ], "operator": "OR" } ] } ]