Prior to version 3.2.3 on 'stable' branch and version 3.3.0.beta3 on 'tests-passed' branch of Discourse, an attacker can execute arbitrary JavaScript on users' browsers by posting a specific URL with malicious meta tags due to a CSP vulnerability
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | BIT-DISCOURSE-2024-35234 | 9 Jul 202408:43 | – | osv |
![]() | CVE-2024-35234 | 3 Jul 202419:15 | – | osv |
![]() | CVE-2024-35234 | 3 Jul 202419:15 | – | nvd |
![]() | CVE-2024-35234 Discourse vulnerable to stored-dom XSS via Facebook Oneboxes | 3 Jul 202418:23 | – | cvelist |
![]() | CVE-2024-35234 Discourse vulnerable to stored-dom XSS via Facebook Oneboxes | 3 Jul 202418:23 | – | vulnrichment |
![]() | Discourse 3.3.x < 3.3.0.beta3 Multiple Vulnerabilities | 4 Jul 202400:00 | – | openvas |
![]() | Discourse < 3.2.3 Multiple Vulnerabilities | 4 Jul 202400:00 | – | openvas |
[
{
"vendor": "discourse",
"product": "discourse",
"versions": [
{
"version": "stable < 3.2.3",
"status": "affected"
},
{
"version": "tests-passed < 3.3.0.beta3",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo