
CVE-2022-46177 – Discourse password reset link can lead to in account takeover if user changes to a new email
https://notcve.org/view.php?id=CVE-2022-46177
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an acco... • https://github.com/discourse/discourse/commit/4bf306f0e3bf54a9ef9c5886bf1cfb85c20da570 • CWE-613: Insufficient Session Expiration •

CVE-2022-23546 – Discourse vulnerable to private topic leak via email#send_digest
https://notcve.org/view.php?id=CVE-2022-23546
05 Jan 2023 — In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issue. • https://github.com/discourse/discourse/commit/cf862e736565c6fa905c12b5dbe63d0bd056efb8 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-46168 – Group SMTP user emails are exposed in CC email header
https://notcve.org/view.php?id=CVE-2022-46168
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another's email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-s... • https://github.com/discourse/discourse/pull/19724 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVE-2022-23548
https://notcve.org/view.php?id=CVE-2022-23548
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, parsing posts can be susceptible to regular expression denial of service (ReDoS) attacks. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds. • https://github.com/discourse/discourse/pull/19737 • CWE-1333: Inefficient Regular Expression Complexity •

CVE-2022-23549 – Discourse vulnerable to bypass of post max_length using HTML comments
https://notcve.org/view.php?id=CVE-2022-23549
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, users can create posts with raw body longer than the `max_length` site setting by including html comments that are not counted toward the character limit. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds. • https://github.com/discourse/discourse/commit/bf6b08670a927cc80bb090b7a2e710b4b554e6a8 • CWE-20: Improper Input Validation •

CVE-2022-46159 – Any authenticated Discourse user can create an unlisted topic
https://notcve.org/view.php?id=CVE-2022-46159
02 Dec 2022 — Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available. • https://github.com/discourse/discourse/commit/0ce38bd7bce862db251b882613ab7053ca777382 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2022-46148 – Discourse allows self-XSS through malicious composer message
https://notcve.org/view.php?id=CVE-2022-46148
29 Nov 2022 — Discourse is an open-source messaging platform. In versions 2.8.10 and prior on the `stable` branch and versions 2.9.0.beta11 and prior on the `beta` and `tests-passed` branches, users composing malicious messages and navigating to drafts page could self-XSS. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Discourse es una plataforma de mens... • https://github.com/discourse/discourse/security/advisories/GHSA-c5h6-6gg5-84fh • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-46150 – Discourse may allow exposure of hidden tags in the subject of notification emails
https://notcve.org/view.php?id=CVE-2022-46150
29 Nov 2022 — Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This issue is patched in version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches. As a workaround, use the `disable_email` site setting to disable all emails to non-staff... • https://github.com/discourse/discourse/commit/84c83e8d4a1907f8a2972f0ab44b6402aa910c3b • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-41921 – Discourse chat messages should have a maximum character limit
https://notcve.org/view.php?id=CVE-2022-41921
28 Nov 2022 — Discourse is an open-source discussion platform. Prior to version 2.9.0.beta13, users can post chat messages of an unlimited length, which can cause a denial of service for other users when posting huge amounts of text. Users should upgrade to version 2.9.0.beta13, where a limit has been introduced. No known workarounds are available. Discourse es una plataforma de discusión de código abierto. • https://github.com/discourse/discourse/commit/3de765c89524a526ce611e11468d758a471a933f • CWE-20: Improper Input Validation CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2022-41944 – Discourse users can see notifications for topics they no longer have access to
https://notcve.org/view.php?id=CVE-2022-41944
28 Nov 2022 — Discourse is an open-source discussion platform. In stable versions prior to 2.8.12 and beta or tests-passed versions prior to 2.9.0.beta.13, under certain conditions, a user can see notifications for topics they no longer have access to. If there is sensitive information in the topic title, it will therefore have been exposed. This issue is patched in stable version 2.8.12, beta version 2.9.0.beta13, and tests-passed version 2.9.0.beta13. There are no workarounds available. • https://github.com/discourse/discourse/commit/c6ee28ec756436cc9ce154dd2c8e4c441f92f693 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •