Discourse is an open source discussion platform. Versions 2.8.2 and prior in the `stable` branch, 2.9.0.beta3 and prior in the `beta` branch, and 2.9.0.beta3 and prior in the `tests-passed` branch are vulnerable to a data leak. Users can request an export of their own activity. Sometimes, due to category settings, they may have category membership for a secure category. The name of this secure category is shown to the user in the export. The same thing occurs when the user's post has been moved to a secure category. A patch for this issue is available in the `main` branch of Discourse's GitHub repository and is anticipated to be part of future releases.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/commit/9d5737fd28374cc876c070f6c3a931a8071ec356 | Patch Third Party Advisory |
https://github.com/discourse/discourse/pull/16273 | Patch Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-c3cq-w899-f343 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-03-24 21:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-24782
Mitre link : CVE-2022-24782
CVE.ORG link : CVE-2022-24782
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor