First published: Wed Nov 02 2022(Updated: )
Discourse is a platform for community discussion. Users who receive an invitation link that is not scoped to a single email address can enter any non-admin user's email and gain access to their account when accepting the invitation. All users should upgrade to the latest version. A workaround is temporarily disabling invitations with `SiteSetting.max_invites_per_day = 0` or scope them to individual email addresses.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <2.8.10 | |
Discourse | =2.9.0-beta1 | |
Discourse | =2.9.0-beta10 | |
Discourse | =2.9.0-beta2 | |
Discourse | =2.9.0-beta3 | |
Discourse | =2.9.0-beta4 | |
Discourse | =2.9.0-beta5 | |
Discourse | =2.9.0-beta6 | |
Discourse | =2.9.0-beta7 | |
Discourse | =2.9.0-beta8 | |
Discourse | =2.9.0-beta9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39356 is considered a high-severity vulnerability due to its potential for unauthorized account access.
To address CVE-2022-39356, users should upgrade to the latest version of Discourse.
CVE-2022-39356 affects all users of Discourse versions prior to 2.8.10 and beta versions of 2.9.0.
CVE-2022-39356 allows an attacker to access the account of any non-admin user by exploiting invitation links not scoped to an email address.
There are no specific workarounds for CVE-2022-39356; upgrading to a secure version is the recommended action.