First published: Thu Sep 28 2023(Updated: )
discourse-encrypt is a plugin that provides a secure communication channel through Discourse. Improper escaping of encrypted topic titles could lead to a cross site scripting (XSS) issue when a site has content security policy (CSP) headers disabled. Having CSP disabled is a non-default configuration, and having it disabled with discourse-encrypt installed will result in a warning in the Discourse admin dashboard. This has been fixed in commit `9c75810af9` which is included in the latest version of the discourse-encrypt plugin. Users are advised to upgrade. Users unable to upgrade should ensure that CSP headers are enabled and properly configured.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse Discourse-encrypt | <2023-09-28 |
https://github.com/discourse/discourse-encrypt/commit/9c75810af9a474d7edaec67dea66f852c0ba1f4e
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43657 is a vulnerability in the discourse-encrypt plugin that allows for cross site scripting (XSS) attacks.
The severity of CVE-2023-43657 is high, with a severity value of 6.1.
CVE-2023-43657 occurs due to improper escaping of encrypted topic titles, which can lead to a cross site scripting (XSS) issue.
To fix CVE-2023-43657, it is recommended to update to the latest version of the discourse-encrypt plugin and enable Content Security Policy (CSP) headers.
More information about CVE-2023-43657 can be found in the references provided: [link1], [link2], [link3].