CVE-2022-39385 – Users erroneously and transparently added to private messages in Discourse
https://notcve.org/view.php?id=CVE-2022-39385
Discourse is the an open source discussion platform. In some rare cases users redeeming an invitation can be added as a participant to several private message topics that they should not be added to. They are not notified of this, it happens transparently in the background. This issue has been resolved in commit `a414520742` and will be included in future releases. Users are advised to upgrade. • https://github.com/discourse/discourse/commit/a414520742da8dc9dc976d4fb7b72dbd445813bb https://github.com/discourse/discourse/security/advisories/GHSA-gh5r-j595-qx48 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •
CVE-2022-39356 – Discourse user account takeover via email and invite link
https://notcve.org/view.php?id=CVE-2022-39356
Discourse is a platform for community discussion. Users who receive an invitation link that is not scoped to a single email address can enter any non-admin user's email and gain access to their account when accepting the invitation. All users should upgrade to the latest version. A workaround is temporarily disabling invitations with `SiteSetting.max_invites_per_day = 0` or scope them to individual email addresses. Discourse es una plataforma para la discusión comunitaria. • https://github.com/discourse/discourse/pull/18817 https://github.com/discourse/discourse/security/advisories/GHSA-x8w7-rwmr-w278 • CWE-285: Improper Authorization •
CVE-2022-39241 – Possible Server-Side Request Forgery (SSRF) in webhooks
https://notcve.org/view.php?id=CVE-2022-39241
Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest `stable`, `beta`, and `test-passed` versions are now patched. As a workaround, self-hosters can use `DISCOURSE_BLOCKED_IP_BLOCKS` env var (which overrides `blocked_ip_blocks` setting) to stop webhooks from accessing private IPs. Discourse es una plataforma para la discusión comunitaria. • https://github.com/discourse/discourse/security/advisories/GHSA-rcc5-28r3-23rr • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2022-39378 – Displaying user badges can leak topic titles to users that have no access to the topic
https://notcve.org/view.php?id=CVE-2022-39378
Discourse is a platform for community discussion. Under certain conditions, a user badge may have been awarded based on a user's activity in a topic with restricted access. Before this vulnerability was disclosed, the topic title of the topic associated with the user badge may be viewed by any user. If there are sensitive information in the topic title, it will therefore have been exposed. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. • https://github.com/discourse/discourse/security/advisories/GHSA-2gvq-27h6-4h5f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-39232 – Discourse vulnerable to incomplete quote causing a topic to crash in the browser
https://notcve.org/view.php?id=CVE-2022-39232
Discourse is an open source discussion platform. Starting with version 2.9.0.beta5 and prior to version 2.9.0.beta10, an incomplete quote can generate a JavaScript error which will crash the current page in the browser in some cases. Version 2.9.0.beta10 added a fix and tests to ensure incomplete quotes won't break the app. As a workaround, the quote can be fixed via the rails console. Discourse es una plataforma de debate de código abierto. • https://github.com/discourse/discourse/commit/eab33af5bf19827527fe79134d865b5c727f6530 https://github.com/discourse/discourse/pull/18311 https://github.com/discourse/discourse/security/advisories/GHSA-cv64-v73f-7wq5 • CWE-20: Improper Input Validation •