Discourse is an open-source discussion platform. Improperly sanitized user input could lead to an XSS vulnerability in some situations. This vulnerability only affects Discourse instances which have disabled the default Content Security Policy. The vulnerability is patched in 3.1.5 and 3.2.0.beta5. As a workaround, ensure Content Security Policy is enabled and does not include `unsafe-inline`.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/commit/568d704a94c528b7c2cb0f3512a7b7b606bc3000 | Patch |
https://github.com/discourse/discourse/security/advisories/GHSA-rj3g-8q6p-63pc | Vendor Advisory |
https://meta.discourse.org/t/3-1-5-security-and-bug-fix-release/293094 | Release Notes Vendor Advisory |
https://meta.discourse.org/t/3-2-0-beta5-add-groups-to-dms-mobile-chat-footer-redesign-passkeys-enabled-by-default-and-more/293093 | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-30T21:31:35.617Z
Updated: 2024-01-30T21:31:35.617Z
Reserved: 2024-01-22T22:23:54.340Z
Link: CVE-2024-23834
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-30T22:15:53.307
Modified: 2024-02-08T16:39:31.963
Link: CVE-2024-23834
JSON object: View
Redhat Information
No data.
CWE