Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/discourse/discourse/security/advisories/GHSA-2vjv-pgh4-6rmq | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Oct 2024, 01:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:* cpe:2.3:a:discourse:discourse:3.4.0:-:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:* |
|
| References | () https://github.com/discourse/discourse/security/advisories/GHSA-2vjv-pgh4-6rmq - Vendor Advisory | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Discourse
Discourse discourse |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
07 Oct 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-07 21:15
Updated : 2024-10-19 01:11
NVD link : CVE-2024-45051
Mitre link : CVE-2024-45051
JSON object : View
Products Affected
discourse
- discourse
CWE
