Vulnerability CVE-2022-31025


Published: 2022-06-07

Description:
Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.

Type:

CWE-863

(Incorrect Authorization)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Discourse -> Discourse 

 References:
https://github.com/discourse/discourse/security/advisories/GHSA-x7jh-mx5q-6f9q
https://github.com/discourse/discourse/commit/7c4e2d33fa4b922354c177ffc880a2f2701a91f9
https://github.com/discourse/discourse/commit/0fa0094531efc82d9371f90a02aa804b176d59cf
https://github.com/discourse/discourse/pull/16974
https://github.com/discourse/discourse/pull/16984

Copyright 2024, cxsecurity.com

 

Back to Top