
CVE-2023-23624 – Discourse's exclude_tags param could leak which topics had a specific hidden tag
https://notcve.org/view.php?id=CVE-2023-23624
27 Jan 2023 — Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches, someone can use the `exclude_tag param` to filter out topics and deduce which ones were using a specific hidden tag. This affects any Discourse site using hidden tags in public categories. This issue is patched in version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches. As a workaround, secure any cate... • https://github.com/discourse/discourse/commit/f55e0fe7910149c431861c18ce407d1be0d6091a • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-23621 – Discourse vulnerable to ReDoS in user agent parsing
https://notcve.org/view.php?id=CVE-2023-23621
27 Jan 2023 — Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches, a malicious user can cause a regular expression denial of service using a carefully crafted user agent. This issue is patched in version 3.0.1 on the `stable` branch and version 3.1.0.beta2 on the `beta` and `tests-passed` branches. There are no known workarounds. Discourse es una plataforma de discusión de código abierto. • https://github.com/discourse/discourse/commit/6d92c3cbdac431db99a450f360a3048bb3aaf458 • CWE-1333: Inefficient Regular Expression Complexity •

CVE-2023-22740 – Discourse vulnerable to Allocation of Resources Without Limits via Chat drafts
https://notcve.org/view.php?id=CVE-2023-22740
27 Jan 2023 — Discourse is an open source platform for community discussion. Versions prior to 3.1.0.beta1 (beta) (tests-passed) are vulnerable to Allocation of Resources Without Limits. Users can create chat drafts of an unlimited length, which can cause a denial of service by generating an excessive load on the server. Additionally, an unlimited number of drafts were loaded when loading the user. This issue has been patched in version 2.1.0.beta1 (beta) and (tests-passed). • https://github.com/discourse/discourse/commit/5eaf0802398ff06604f03b27a28dd274f2ffa576 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-23616 – Discourse membership requests lack character limit
https://notcve.org/view.php?id=CVE-2023-23616
27 Jan 2023 — Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the request. This could potentially allow a user to flood the database with a large amount of data. However it is unlikely this could be used as part of a DoS attack, as the paths reading back the reasons are only available to administrators. Starting in version ... • https://github.com/discourse/discourse/commit/3e0cc4a5d9ef44ad902f6985d046ebb32f0a14ee • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-23620 – Discourse restricted tag routes leak topic information
https://notcve.org/view.php?id=CVE-2023-23620
27 Jan 2023 — Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, the contents of latest/top routes for restricted tags can be accessed by unauthorized users. This issue is patched in version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches. There are no known workarounds. Discourse es una plataforma de discusión de código abierto. • https://github.com/discourse/discourse/commit/105fee978d73b0ec23ff814a09d1c0c9ace95164 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-22739 – Discourse subject to Allocation of Resources Without Limits or Throttling
https://notcve.org/view.php?id=CVE-2023-22739
26 Jan 2023 — Discourse is an open source platform for community discussion. Versions prior to 3.0.1 (stable), 3.1.0.beta2 (beta), and 3.1.0.beta2 (tests-passed) are subject to Allocation of Resources Without Limits or Throttling. As there is no limit on data contained in a draft, a malicious user can create an arbitrarily large draft, forcing the instance to a crawl. This issue is patched in versions 3.0.1 (stable), 3.1.0.beta2 (beta), and 3.1.0.beta2 (tests-passed). There are no workarounds. • https://github.com/discourse/discourse/security/advisories/GHSA-rqgr-g6v7-jcfc • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-22468 – Discourse vulnerable to Cross-site Scripting in local oneboxes
https://notcve.org/view.php?id=CVE-2023-22468
26 Jan 2023 — Discourse is an open source platform for community discussion. Versions prior to 2.8.13 (stable), 3.0.0.beta16 (beta) and 3.0.0beta16 (tests-passed), are vulnerable to cross-site Scripting. A maliciously crafted URL can be included in a post to carry out cross-site scripting attacks on sites with disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. This vulnerability is patched in versions 2.8.13 (stable), 3.0.0.beta16 (beta) and 3.0.0beta16 (test... • https://github.com/discourse/discourse/security/advisories/GHSA-8mr2-xf8r-wr8m • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-22455 – Discourse vulnerable to Cross-site Scripting through tag descriptions
https://notcve.org/view.php?id=CVE-2023-22455
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, tag descriptions, which can be updated by moderators, can be used for cross-site scripting attacks. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. Versions 2.8.14 and 3.0.0.beta16 contain a patch. • https://github.com/discourse/discourse/commit/692329896ac64d8581947e977202c243eef3b5a2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-22454 – Discourse vulnerable to Cross-site Scripting through pending post titles descriptions
https://notcve.org/view.php?id=CVE-2023-22454
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, pending post titles can be used for cross-site scripting attacks. Pending posts can be created by unprivileged users when a category has the "require moderator approval of all new topics" setting set. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. A patch is availa... • https://github.com/discourse/discourse/commit/c0e2d7badac276d82a4056a994b48d68a8993a12 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-22453 – Discourse vulnerable to exposure of user post counts per topic to unauthorized users
https://notcve.org/view.php?id=CVE-2023-22453
05 Jan 2023 — Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, the number of times a user posted in an arbitrary topic is exposed to unauthorized users through the `/u/username.json` endpoint. The issue is patched in version 2.8.14 and 3.0.0.beta16. There is no known workaround. • https://github.com/discourse/discourse/commit/cbcf8a064b4889a19c991641e09c399bfa1ef2ad • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •