SB2023111318 - Multiple vulnerabilities in Discourse
Published: November 13, 2023 Updated: February 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-45806)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to regexp injection issue in Full Name. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
2) Information disclosure (CVE-ID: CVE-2023-45816)
The vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A local attacker can gain access to unread bookmark reminder notifications.
3) Improper access control (CVE-ID: CVE-2023-46130)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to height value bypass in some theme components. A remote user can add svgs with unlimited height attributes and affect the availability of subsequent replies in a topic.
4) Cross-site scripting (CVE-ID: CVE-2023-47119)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in oneboxed links. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Input validation error (CVE-ID: CVE-2023-47120)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the Onebox favicon URL. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
6) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2023-47121)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in Embedding. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
Remediation
Install update from vendor's website.
References
- https://github.com/discourse/discourse/security/advisories/GHSA-hcgf-hg2g-mw78
- https://github.com/discourse/discourse/commit/2ec25105179199cf80912bf011c18b8b870e1863
- https://github.com/discourse/discourse/commit/7d484864fe91ff79c478f57e7ddb1235d701921e
- https://github.com/discourse/discourse/security/advisories/GHSA-v9r6-92wp-f6cf
- https://github.com/discourse/discourse/commit/2c45b949ea0e9d6fa8e5af2dd07f6521ede08bf1
- https://github.com/discourse/discourse/commit/3c5fb871c0f54af47679ae71ad449666b01d8216
- https://github.com/discourse/discourse/security/advisories/GHSA-c876-638r-vfcg
- https://github.com/discourse/discourse/commit/6183d9633de873ac2b1e9cdb6ac1c94b4ffae9cb
- https://github.com/discourse/discourse/commit/89a2e60706ce22e4afc463d03af2f34c53291800
- https://github.com/discourse/discourse/security/advisories/GHSA-j95w-5hvx-jp5w
- https://github.com/discourse/discourse/commit/628b293ff53fb617b3464dd27268aec84388cc09
- https://github.com/discourse/discourse/commit/d78357917c6a917a8a27af68756228e89c69321c
- https://github.com/discourse/discourse/security/advisories/GHSA-77cw-xhj8-hfp3
- https://github.com/discourse/discourse/commit/95a82d608d6377faf68a0e2c5d9640b043557852
- https://github.com/discourse/discourse/commit/e910dd09140cb4abc3a563b95af4a137ca7fa0ce
- https://github.com/discourse/discourse/security/advisories/GHSA-hp24-94qf-8cgc
- https://github.com/discourse/discourse/commit/24cca10da731734af4e9748de99a508d586e59f1
- https://github.com/discourse/discourse/commit/5f20748e402223b265e6fee381472c14e2604da6