CVE-2022-46148
CVSS V2 None
CVSS V3 None
Description
Discourse is an open-source messaging platform. In versions 2.8.10 and prior on the `stable` branch and versions 2.9.0.beta11 and prior on the `beta` and `tests-passed` branches, users composing malicious messages and navigating to drafts page could self-XSS. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in the latest stable, beta and tests-passed versions of Discourse.
Overview
- CVE ID
- CVE-2022-46148
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-29T17:15:11.370
- Last Modified Date
- 2022-12-01T22:02:03.253
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:* | 1 | OR | 2.8.10 | |
cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-c5h6-6gg5-84fh | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-46148 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46148 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-07 18:05:30 | Added to TrackCVE |