Show plain JSON{"id": "CVE-2021-32764", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 3.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.4, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.5, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 2.8}]}, "published": "2021-07-15T21:15:09.373", "references": [{"url": "https://github.com/discourse/discourse/security/advisories/GHSA-9x4c-29xg-56hw", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Discourse is an open-source discussion platform. In Discourse versions 2.7.5 and prior, parsing and rendering of YouTube Oneboxes can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse's default Content Security Policy. The issue is patched in `stable` version 2.7.6, `beta` version 2.8.0.beta3, and `tests-passed` version 2.8.0.beta3. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks."}, {"lang": "es", "value": "Discourse es una plataforma de debate de c\u00f3digo abierto. En Discourse versiones 2.7.5 y anteriores, el an\u00e1lisis y la renderizaci\u00f3n de los Oneboxes de YouTube pueden ser susceptibles a ataques de tipo XSS. Esta vulnerabilidad s\u00f3lo afecta a los sitios que han modificado o desactivado la pol\u00edtica de seguridad de contenidos predeterminada de Discourse. El problema est\u00e1 parcheado en versiones \"estable\" 2.7.6, \"beta\" 2.8.0.beta3 y \"tests-passed\" 2.8.0.beta3. Como soluci\u00f3n, aseg\u00farese de que la pol\u00edtica de seguridad de contenidos est\u00e1 activada y no ha sido modificada de manera que sea m\u00e1s vulnerable a ataques de tipo XSS"}], "lastModified": "2021-09-13T14:44:47.700", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE17BE6D-684F-4D02-BD74-A5527DC5075E", "versionEndIncluding": "2.7.5"}, {"criteria": "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E7F8AC4-35D1-45E5-8A3A-B0205000A5D3"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}