First published: Tue Apr 26 2022(Updated: )
Discourse Assign is a plugin for assigning users to a topic in Discourse, an open-source messaging platform. Prior to version 1.0.1, the UserBookmarkSerializer serialized the whole User / Group object, which leaked some private information. The data was only being serialized to people who could view assignment info, which is limited to staff by default. For the vast majority of sites, this data was only leaked to trusted staff member, but for sites with assign features enabled publicly, the data was accessible to more people than just staff. Version 1.0.1 contains a patch. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Assign | <1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24866 is classified as a high severity vulnerability due to the potential leakage of private user information.
To fix CVE-2022-24866, upgrade the Discourse Assign plugin to version 1.0.1 or later.
CVE-2022-24866 can leak sensitive data by serializing the entire User / Group object, which may include private user information.
Yes, CVE-2022-24866 affects versions of the Discourse Assign plugin before 1.0.1.
Users of the Discourse Assign plugin who are running versions prior to 1.0.1 are affected by CVE-2022-24866.