First published: Tue Jun 13 2023(Updated: )
Discourse is an open source discussion platform. Prior to version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches, an attacker could use the new topics dismissal endpoint to reveal the number of topics recently created (but not the actual content thereof) in categories they didn't have access to. This issue is patched in version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse | <3.0.4 | |
Discourse Discourse | =3.1.0-beta1 | |
Discourse Discourse | =3.1.0-beta2 | |
Discourse Discourse | =3.1.0-beta3 | |
Discourse Discourse | =3.1.0-beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34250 is a vulnerability in the Discourse open source discussion platform that allows an attacker to reveal the number of recently created topics.
CVE-2023-34250 has a severity rating of 5.3, which is considered medium.
CVE-2023-34250 affects Discourse versions up to and including 3.0.4 of the 'stable' branch and version 3.1.0-beta1 to 3.1.0-beta4 of the 'beta' and 'tests-passed' branches.
An attacker can exploit CVE-2023-34250 by using the new topics dismissal endpoint to reveal the number of topics recently created, but not the actual content.
Yes, upgrading to version 3.0.4 of the 'stable' branch or version 3.1.0.beta5 of the 'beta' and 'tests-passed' branches will fix CVE-2023-34250.