Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, an attacker can execute arbitrary JavaScript on users’ browsers by posting a specific URL containing maliciously crafted meta tags. This issue only affects sites with Content Security Polic (CSP) disabled. The problem has been patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch. As a workaround, ensure CSP is enabled on the forum.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Discourse
Discourse discourse |
|
CPEs | cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:* cpe:2.3:a:discourse:discourse:3.3.0:beta1:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:3.3.0:beta2:*:*:beta:*:*:* |
|
Vendors & Products |
Discourse
Discourse discourse |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-03T18:23:10.179Z
Updated: 2024-08-02T03:07:46.903Z
Reserved: 2024-05-14T15:39:41.785Z
Link: CVE-2024-35234
Vulnrichment
Updated: 2024-07-08T20:03:38.743Z
NVD
Status : Modified
Published: 2024-07-03T19:15:04.123
Modified: 2024-11-21T09:19:59.373
Link: CVE-2024-35234
Redhat
No data.