First published: Wed Oct 26 2022(Updated: )
Discourse Patreon enables syncronization between Discourse Groups and Patreon rewards. On sites with Patreon login enabled, an improper authentication vulnerability could be used to take control of a victim's forum account. This vulnerability is patched in commit number 846d012151514b35ce42a1636c7d70f6dcee879e of the discourse-patreon plugin. Out of an abundance of caution, any Discourse accounts which have logged in with an unverified-email Patreon account will be logged out and asked to verify their email address on their next login. As a workaround, disable the patreon integration and log out all users with associated Patreon accounts.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Patreon | <2022-10-26 |
https://github.com/discourse/discourse-patreon/commit/846d012151514b35ce42a1636c7d70f6dcee879e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39355 has been classified as a critical severity vulnerability due to its potential to compromise user accounts.
To fix CVE-2022-39355, update to the latest version of Discourse Patreon released after October 26, 2022.
CVE-2022-39355 is an improper authentication vulnerability that could allow attackers to take control of victim forum accounts.
Versions of Discourse Patreon prior to the update on October 26, 2022, are affected by CVE-2022-39355.
The impact of CVE-2022-39355 could allow unauthorized access to users' accounts, compromising sensitive information.