Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
References
Link | Resource |
---|---|
https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP | Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8ph | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-10-16 22:15
Updated : 2023-10-19 17:56
NVD link : CVE-2023-43659
Mitre link : CVE-2023-43659
CVE.ORG link : CVE-2023-43659
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')