In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Mesh3l911/Disource | Third Party Advisory |
https://github.com/discourse/discourse/releases | Release Notes Third Party Advisory |
http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Mesh3l911/Disource | Third Party Advisory |
https://github.com/discourse/discourse/releases | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/Mesh3l911/Disource - Third Party Advisory | |
References | () https://github.com/discourse/discourse/releases - Release Notes, Third Party Advisory |
Information
Published : 2021-01-14 04:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-3138
Mitre link : CVE-2021-3138
CVE.ORG link : CVE-2021-3138
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts