First published: Thu Dec 19 2024(Updated: )
Discourse is an open source platform for community discussion. Sites that are using discourse connect but still have local logins enabled could allow attackers to bypass discourse connect to create accounts and login. This problem is patched in the latest version of Discourse. Users unable to upgrade who are using discourse connect may disable all other login methods as a workaround.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discourse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-49765 is classified as high due to the potential for attackers to bypass authentication.
To fix CVE-2024-49765, update to the latest version of Discourse that includes the security patch.
CVE-2024-49765 affects installations of Discourse that have local logins enabled while using Discourse connect.
Yes, CVE-2024-49765 allows attackers to create accounts and log in without proper authorization.
Yes, CVE-2024-49765 is known and has been addressed in the most recent updates of Discourse.