We found results for “”
CVE-2023-25172
Date: March 17, 2023
Discourse is an open-source discussion platform. Prior to version 3.0.1 of the "stable" branch and version 3.1.0.beta2 of the "beta" and "tests-passed" branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the "stable" branch and version 3.1.0.beta2 of the "beta" and "tests-passed" branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.
Language: Ruby
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


