Metrics
Affected Vendors & Products
Wed, 12 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Tue, 11 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by posting a maliciously crafted onebox url. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP, disable inline Oneboxes globally, or allow specific domains for Oneboxing. | |
Title | HTMLi(XSS without CSP) via Onebox urls in Discourse | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T14:03:59.537Z
Reserved: 2024-12-19T18:34:22.764Z
Link: CVE-2024-56328

Updated: 2025-02-11T21:31:10.758Z

Status : Received
Published: 2025-02-04T21:15:27.400
Modified: 2025-02-04T21:15:27.400
Link: CVE-2024-56328

No data.