Discourse is an open source platform for community discussion. Due to the improper sanitization of SVG files, an attacker can execute arbitrary JavaScript on the users’ browsers by uploading a crafted SVG file. This issue is patched in the latest stable and tests-passed versions of Discourse. Users are advised to upgrade. For users unable to upgrade there are two possible workarounds: enable CDN handing of uploads (and ensure the CDN sanitizes SVG files) or disable SVG file uploads by ensuring that the `authorized extensions` site setting does not include `svg` (or reset that setting to the default, by default Discourse doesn't enable SVG uploads by users).
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-w5mv-4pjf-xj43 | Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-04-18T21:25:58.848Z
Updated: 2023-04-18T21:25:58.848Z
Reserved: 2023-04-12T15:19:33.766Z
Link: CVE-2023-30538
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-18T22:15:08.130
Modified: 2023-04-28T03:50:49.933
Link: CVE-2023-30538
JSON object: View
Redhat Information
No data.
CWE