
CVE-2021-43793 – Bypass of Poll voting limits in Discourse
https://notcve.org/view.php?id=CVE-2021-43793
01 Dec 2021 — Discourse is an open source discussion platform. In affected versions a vulnerability in the Polls feature allowed users to vote multiple times in a single-option poll. The problem is patched in the latest tests-passed, beta and stable versions of Discourse Discourse es una plataforma de debate de código abierto. En las versiones afectadas, una vulnerabilidad en la funcionalidad Polls permitía a usuarios votar varias veces en una encuesta de una sola opción. El problema se ha parcheado en las últimas versio... • https://github.com/discourse/discourse/commit/0c6b9df77bac9c6f7c7e2eadf6fe100064afdeab • CWE-269: Improper Privilege Management •

CVE-2021-43794 – Anonymous user cache poisoning via development-mode header in Discourse
https://notcve.org/view.php?id=CVE-2021-43794
01 Dec 2021 — Discourse is an open source discussion platform. In affected versions an attacker can poison the cache for anonymous (i.e. not logged in) users, such that the users are shown a JSON blob instead of the HTML page. This can lead to a partial denial-of-service. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Discourse es una plataforma de debate de código abierto. • https://github.com/discourse/discourse/commit/2da0001965c6d8632d723c46ea5df9f22a1a23f1 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVE-2021-43792 – Notifications leak in Discourse
https://notcve.org/view.php?id=CVE-2021-43792
01 Dec 2021 — Discourse is an open source discussion platform. In affected versions a vulnerability affects users of tag groups who use the "Tags are visible only to the following groups" feature. A tag group may only allow a certain group (e.g. staff) to view certain tags. Users who were tracking or watching the tags via /preferences/tags, then have their staff status revoked will still see notifications related to the tag, but will not see the tag on each topic. This issue has been patched in stable version 2.7.11. • https://github.com/discourse/discourse/commit/cdaf7f4bb3ec268238e4c29a14bb73fad56574b4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-41271 – Cache poisoning via maliciously-formed request in discourse
https://notcve.org/view.php?id=CVE-2021-41271
15 Nov 2021 — Discourse is a platform for community discussion. In affected versions a maliciously crafted request could cause an error response to be cached by intermediate proxies. This could cause a loss of confidentiality for some content. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Discourse es una plataforma para el debate comunitario. • https://github.com/discourse/discourse/commit/2da0001965c6d8632d723c46ea5df9f22a1a23f1 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-41163 – RCE via malicious SNS subscription payload
https://notcve.org/view.php?id=CVE-2021-41163
20 Oct 2021 — Discourse is an open source platform for community discussion. In affected versions maliciously crafted requests could lead to remote code execution. This resulted from a lack of validation in subscribe_url values. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. To workaround the issue without updating, requests with a path starting /webhooks/aws path could be blocked at an upstream proxy. • https://github.com/discourse/discourse/commit/fa3c46cf079d28b086fe1025349bb00223a5d5e9 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2021-41095 – XSS via blocked watched word in error message
https://notcve.org/view.php?id=CVE-2021-41095
27 Sep 2021 — Discourse is an open source discussion platform. There is a cross-site scripting (XSS) vulnerability in versions 2.7.7 and earlier of the `stable` branch, versions 2.8.0.beta6 and earlier of the `beta` branch, and versions 2.8.0.beta6 and earlier of the `tests-passed` branch. Rendering of some error messages that contain user input can be susceptible to XSS attacks. This vulnerability only affects sites which have blocked watched words that contain HTML tags, modified or disabled Discourse's default Content... • https://github.com/discourse/discourse/pull/14434/commits/40b776b9d39c41d9273d01eecf8fe03aa39fcb59 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-24327
https://notcve.org/view.php?id=CVE-2020-24327
23 Sep 2021 — Server Side Request Forgery (SSRF) vulnerability exists in Discourse 2.3.2 and 2.6 via the email function. When writing an email in an editor, you can upload pictures of remote websites. Se presenta una vulnerabilidad de tipo Server Side Request Forgery (SSRF) en Discourse 2.3.2 y 2.6, por medio de la función de correo electrónico. Cuando se escribe un correo electrónico en un editor, se pueden cargar imágenes de sitios web remotos • https://github.com/discourse/discourse/pull/10509 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2021-41082 – Private message title and participating users leaked in discourse
https://notcve.org/view.php?id=CVE-2021-41082
20 Sep 2021 — Discourse is a platform for community discussion. In affected versions any private message that includes a group had its title and participating user exposed to users that do not have access to the private messages. However, access control for the private messages was not compromised as users were not able to view the posts in the leaked private message despite seeing it in their inbox. The problematic commit was reverted around 32 minutes after it was made. Users are encouraged to upgrade to the latest com... • https://github.com/discourse/discourse/commit/27bad28c530c89acab35a56b945b6a3924280f4b • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •

CVE-2021-39161 – Cross-site scripting via category name in Discourse
https://notcve.org/view.php?id=CVE-2021-39161
26 Aug 2021 — Discourse is an open source platform for community discussion. In affected versions category names can be used for Cross-site scripting(XSS) attacks. This is mitigated by Discourse's default Content Security Policy and this vulnerability only affects sites which have modified or disabled or changed Discourse's default Content Security Policy have allowed for moderators to modify categories. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to ensure t... • https://github.com/discourse/discourse/security/advisories/GHSA-xhmc-9jwm-wqph • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-37703 – Information exposure in Discourse
https://notcve.org/view.php?id=CVE-2021-37703
13 Aug 2021 — Discourse is an open-source platform for community discussion. In Discourse before versions 2.7.8 and 2.8.0.beta5, a user's read state for a topic such as the last read post number and the notification level is exposed. Discourse es una plataforma de código abierto para el debate comunitario. En Discourse versiones anteriores a 2.7.8 y 2.8.0.beta5, el estado de lectura de un usuario para un tema, como el número de la última publicación leída y el nivel de notificación, está expuesto. • https://github.com/discourse/discourse/commit/aed65ec16d38886d7be7209d8c02df4ffd4937a4 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •