CVE-2022-21677 – Group advanced search option may leak group and group's members visibility
https://notcve.org/view.php?id=CVE-2022-21677
Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. • https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44 https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-21684 – User can bypass approval when invited to Discourse
https://notcve.org/view.php?id=CVE-2022-21684
Discourse is an open source discussion platform. Versions prior to 2.7.13 in `stable`, 2.8.0.beta11 in `beta`, and 2.8.0.beta11 in `tests-passed` allow some users to log in to a community before they should be able to do so. A user invited via email to a forum with `must_approve_users` enabled is going to be automatically logged in, bypassing the check that does not allow unapproved users to sign in. They will be able to do everything an approved user can do. If they logout, they cannot log back in. • https://github.com/discourse/discourse/commit/584c6a2e8bc705072b09a9c4b55126d6f8ed4ad2 https://github.com/discourse/discourse/security/advisories/GHSA-p63q-jp48-h8xh https://meta.discourse.org/t/invite-redemption-allowed-user-to-access-forum-before-approval/214328 • CWE-287: Improper Authentication •
CVE-2022-21678 – User's bio visible even if profile is restricted in Discourse
https://notcve.org/view.php?id=CVE-2022-21678
Discourse is an open source discussion platform. Prior to version 2.8.0.beta11 in the `tests-passed` branch, version 2.8.0.beta11 in the `beta` branch, and version 2.7.13 in the `stable` branch, the bios of users who made their profiles private were still visible in the `<meta>` tags on their users' pages. The problem is patched in `tests-passed` version 2.8.0.beta11, `beta` version 2.8.0.beta11, and `stable` version 2.7.13 of Discourse. Discourse es una plataforma de debate de código abierto. En versiones anteriores a 2.8.0.beta11 en la rama "tests-passed", la versión 2.8.0.beta11 en la rama "beta", y la versión 2.7.13 en la rama "stable", las biografías de los usuarios que hacían sus perfiles privados seguían siendo visibles en las etiquetas "(meta)" de sus páginas de usuario. • https://github.com/discourse/discourse/commit/5e2e178fcfb490c37b9f8bb9f737185441b1d6de https://github.com/discourse/discourse/commit/c0bb775f3f35b1b0d04a5b2a984f57c3e39f9e6c https://github.com/discourse/discourse/security/advisories/GHSA-jwww-46gv-564m • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •
CVE-2022-21642 – Exposure of whisper participants in discourse
https://notcve.org/view.php?id=CVE-2022-21642
Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade. Discourse es una plataforma de código abierto para la discusión comunitaria. • https://github.com/discourse/discourse/commit/702685b6a06ae45a544fc702027f1e4573d94aaa https://github.com/discourse/discourse/security/advisories/GHSA-mx3h-vc7w-r9c6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-43850 – Denial of Service in discourse
https://notcve.org/view.php?id=CVE-2021-43850
Discourse is an open source platform for community discussion. In affected versions admins users can trigger a Denial of Service attack via the `/message-bus/_diagnostics` path. The impact of this vulnerability is greater on multisite Discourse instances (where multiple forums are served from a single application server) where any admin user on any of the forums are able to visit the `/message-bus/_diagnostics` path. The problem has been patched. Please upgrade to 2.8.0.beta10 or 2.7.12. • https://github.com/discourse/discourse/commit/7a8ec129fb54f188b2da6588c9d24d3a36eb0d39 https://github.com/discourse/discourse/security/advisories/GHSA-59jr-pj65-qmvr • CWE-20: Improper Input Validation •