First published: Thu Sep 29 2022(Updated: )
Discourse is an open source discussion platform. Starting with version 2.9.0.beta5 and prior to version 2.9.0.beta10, an incomplete quote can generate a JavaScript error which will crash the current page in the browser in some cases. Version 2.9.0.beta10 added a fix and tests to ensure incomplete quotes won't break the app. As a workaround, the quote can be fixed via the rails console.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | =2.9.0-beta5 | |
Discourse Discourse | =2.9.0-beta6 | |
Discourse Discourse | =2.9.0-beta7 | |
Discourse Discourse | =2.9.0-beta8 | |
Discourse Discourse | =2.9.0-beta9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39232 is a vulnerability in the Discourse open source discussion platform that can result in a JavaScript error and crash the current page in the browser.
CVE-2022-39232 has a severity rating of 4.3, which is considered medium.
Versions 2.9.0.beta5 to 2.9.0.beta9 of Discourse are affected by CVE-2022-39232.
To fix CVE-2022-39232, update your Discourse installation to version 2.9.0.beta10 or later.
You can find more information about CVE-2022-39232 in the following references: [link1], [link2], [link3]