First published: Thu Jan 14 2021(Updated: )
In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <=2.6.0 | |
Discourse | =2.7.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3138 has a medium severity rating as it allows a rate-limit bypass leading to a circumvention of the two-factor authentication requirement.
To fix CVE-2021-3138, upgrade Discourse to version 2.7.0 or later beyond the beta1 release.
CVE-2021-3138 affects Discourse versions 2.7.0-beta1 and all earlier versions up to 2.6.0.
The impact of CVE-2021-3138 allows attackers to bypass two-factor authentication, potentially compromising user accounts.
There is no official workaround for CVE-2021-3138; upgrading to a patched version is recommended for protection.