Vulnerability Description
Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, an attacker can execute arbitrary JavaScript on users’ browsers by posting a specific URL containing maliciously crafted meta tags. This issue only affects sites with Content Security Polic (CSP) disabled. The problem has been patched in version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch. As a workaround, ensure CSP is enabled on the forum.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discourse | Discourse | < 3.2.3 |
Related Weaknesses (CWE)
References
- https://github.com/discourse/discourse/commit/26aef0c288839378b9de5819e96eac8cf4Patch
- https://github.com/discourse/discourse/commit/311b737c910cf0a69f61e1b8bc0b78374bPatch
- https://github.com/discourse/discourse/security/advisories/GHSA-5chg-hm8c-wc58Third Party Advisory
- https://github.com/discourse/discourse/commit/26aef0c288839378b9de5819e96eac8cf4Patch
- https://github.com/discourse/discourse/commit/311b737c910cf0a69f61e1b8bc0b78374bPatch
- https://github.com/discourse/discourse/security/advisories/GHSA-5chg-hm8c-wc58Third Party Advisory
FAQ
What is CVE-2024-35234?
CVE-2024-35234 is a vulnerability with a CVSS score of 4.2 (MEDIUM). Discourse is an open-source discussion platform. Prior to version 3.2.3 on the `stable` branch and version 3.3.0.beta3 on the `tests-passed` branch, an attacker can execute arbitrary JavaScript on use...
How severe is CVE-2024-35234?
CVE-2024-35234 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-35234?
Check the references section above for vendor advisories and patch information. Affected products include: Discourse Discourse.