CVE-2022-21684
CVSS V2 Medium 6
CVSS V3 High 8.8
Description
Discourse is an open source discussion platform. Versions prior to 2.7.13 in `stable`, 2.8.0.beta11 in `beta`, and 2.8.0.beta11 in `tests-passed` allow some users to log in to a community before they should be able to do so. A user invited via email to a forum with `must_approve_users` enabled is going to be automatically logged in, bypassing the check that does not allow unapproved users to sign in. They will be able to do everything an approved user can do. If they logout, they cannot log back in. This issue is patched in the `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11. One may disable invites as a workaround. Administrators can increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.
Overview
- CVE ID
- CVE-2022-21684
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-01-13T21:15:08
- Last Modified Date
- 2022-01-24T19:11:16
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:* | 1 | OR | 2.7.13 | |
cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6
- Severity
- MEDIUM
- Exploitability Score
- 6.8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://github.com/discourse/discourse/commit/584c6a2e8bc705072b09a9c4b55126d6f8ed4ad2 | Patch Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-p63q-jp48-h8xh | Patch Third Party Advisory |
https://meta.discourse.org/t/invite-redemption-allowed-user-to-access-forum-before-approval/214328 | Issue Tracking Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-21684 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21684 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:36:27 | Added to TrackCVE | |||
2022-12-06 06:26:29 | 2022-01-13T21:15Z | 2022-01-13T21:15:08 | CVE Published Date | updated |
2022-12-06 06:26:29 | 2022-01-24T19:11:16 | CVE Modified Date | updated | |
2022-12-06 06:26:29 | Analyzed | Vulnerability Status | updated |