CVE-2024-45051
07.10.2024, 21:15
Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
discourse | discourse | 𝑥 < 3.3.2 |
discourse | discourse | 𝑥 < 3.4.0 |
discourse | discourse | 3.4.0 |
discourse | discourse | 3.4.0:beta1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration