CVE-2022-24804
11.04.2022, 20:15
Discourse is an open source platform for community discussion. In stable versions prior to 2.8.3 and beta versions prior 2.9.0.beta4 erroneously expose groups. When a group with restricted visibility has been used to set the permissions of a category, the name of the group is leaked to any user that is able to see the category. To workaround the problem, a site administrator can remove groups with restricted visibility from any category's permissions setting.Enginsight
Vendor | Product | Version |
---|---|---|
discourse | discourse | 𝑥 < 2.8.3 |
discourse | discourse | 2.9.0:beta1 |
discourse | discourse | 2.9.0:beta2 |
discourse | discourse | 2.9.0:beta3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-276 - Incorrect Default PermissionsDuring installation, installed file permissions are set to allow anyone to modify those files.
References