First published: Fri Aug 13 2021(Updated: )
Discourse is an open-source platform for community discussion. In Discourse before versions 2.7.8 and 2.8.0.beta4, when adding additional email addresses to an existing account on a Discourse site an email token is generated as part of the email verification process. Deleting the additional email address does not invalidate an unused token which can then be used in other contexts, including reseting a password.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.7.8 | |
Discourse | =2.8.0-beta1 | |
Discourse | =2.8.0-beta2 | |
Discourse | =2.8.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37693 has a medium severity rating due to potential issues related to email token generation and account verification.
To fix CVE-2021-37693, upgrade to Discourse version 2.7.8 or later, or 2.8.0-beta4 or later.
CVE-2021-37693 affects Discourse versions prior to 2.7.8 and 2.8.0-beta4, including beta versions of 2.8.0 up to beta3.
Exploiting CVE-2021-37693 may allow attackers to bypass email verification processes when adding additional email addresses to accounts.
Yes, CVE-2021-37693 specifically involves vulnerabilities in the email verification process when adding additional email addresses to existing Discourse accounts.