First published: Wed Jul 03 2024(Updated: )
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, an attacker can execute arbitrary JavaScript on users’ browsers by posting a specific URL containing maliciously crafted meta tags. This issue only affects sites with Content Security Polic (CSP) disabled. The problem has been patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch. As a workaround, ensure CSP is enabled on the forum.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse | <3.2.3 | |
Discourse | <3.3.0 | |
Discourse | =3.3.0-beta1 | |
Discourse | =3.3.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35234 has been classified with a critical severity due to the potential for arbitrary JavaScript execution in users' browsers.
To fix CVE-2024-35234, upgrade your Discourse installation to version 3.2.3 or later on the stable branch or version 3.3.0.beta3 or later on the tests-passed branch.
CVE-2024-35234 affects Discourse versions prior to 3.2.3 on the stable branch and versions prior to 3.3.0.beta3 on the tests-passed branch.
CVE-2024-35234 exposes users to potential cross-site scripting (XSS) attacks through maliciously crafted URLs with meta tags.
There are no documented workarounds for CVE-2024-35234, so upgrading is the recommended mitigation strategy.