Описание
Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
Ссылки
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.3.2 (исключая)Версия до 3.4.0 (исключая)
Одно из
cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*
cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*
EPSS
Процентиль: 25%
0.00084
Низкий
8.2 High
CVSS3
Дефекты
CWE-287
NVD-CWE-noinfo
EPSS
Процентиль: 25%
0.00084
Низкий
8.2 High
CVSS3
Дефекты
CWE-287
NVD-CWE-noinfo