First published: Fri Jan 12 2024(Updated: )
Discourse is a platform for community discussion. Under very specific circumstances, secure upload URLs associated with posts can be accessed by guest users even when login is required. This vulnerability has been patched in 3.2.0.beta4 and 3.1.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.1.4 | |
Discourse | =3.2.0-beta1 | |
Discourse | =3.2.0-beta2 | |
Discourse | =3.2.0-beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-49099 is considered moderate, as it allows guest users illicit access to secure upload URLs under specific circumstances.
To fix CVE-2023-49099, upgrade Discourse to version 3.2.0.beta4 or 3.1.4 to mitigate the vulnerability.
CVE-2023-49099 involves unauthorized access to secure upload URLs by guest users despite login being required.
CVE-2023-49099 affects Discourse versions up to 3.1.4 and the beta versions up to 3.2.0-beta3.
CVE-2023-49099 is not classified as critical, but it poses significant risks due to unauthorized access.