// For flags

CVE-2022-41913

Discourse-calendar exposes members of hidden groups

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it's possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it.

Discourse-calendar es un complemento para la plataforma de mensajería Discourse que agrega la capacidad de crear un calendario dinámico en la primera publicación de un tema. Los usuarios pueden enumerar los miembros de grupos privados o grupos públicos con miembros privados, quienes pueden crear y editar eventos de publicación. Esta vulnerabilidad solo afecta a los sitios que tienen habilitados los eventos de publicación de discursos. Este problema se solucionó en el commit `ca5ae3e7e` que se incluirá en versiones futuras. Los usuarios que no puedan actualizar deben desactivar la configuración `discourse_post_event_enabled` para mitigar completamente el problema. Además, es posible evitar que los usuarios habituales utilicen esta vulnerabilidad eliminando todos los grupos de `discourse_post_event_allowed_on_groups`, pero tenga en cuenta que los moderadores aún podrán utilizarla.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-30 CVE Reserved
  • 2022-11-14 CVE Published
  • 2024-06-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Discourse
Search vendor "Discourse"
Calendar
Search vendor "Discourse" for product "Calendar"
0.2
Search vendor "Discourse" for product "Calendar" and version "0.2"
-
Affected