CVE-2023-45131

Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*

History

19 Oct 2023, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*
cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
References (MISC) https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6 - (MISC) https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6 - Vendor Advisory
First Time Discourse
Discourse discourse
CWE CWE-200 NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

16 Oct 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-16 22:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-45131

Mitre link : CVE-2023-45131

CVE.ORG link : CVE-2023-45131


JSON object : View

Products Affected

discourse

  • discourse
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor