CVE-2023-45131

Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*

History

19 Oct 2023, 17:55

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*
cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*
First Time Discourse
Discourse discourse
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6 - (MISC) https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6 - Vendor Advisory

16 Oct 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-16 22:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-45131

Mitre link : CVE-2023-45131

CVE.ORG link : CVE-2023-45131


JSON object : View

Products Affected

discourse

  • discourse
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor