All the vulnerabilites related to discourse - discourse-calendar
cve-2023-43658
Vulnerability from cvelistv5
Published
2023-10-16 21:28
Modified
2024-09-16 15:48
Severity ?
EPSS score ?
Summary
dicourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Improper escaping of event titles could lead to Cross-site Scripting (XSS) within the 'email preview' UI when a site has CSP disabled. Having CSP disabled is a non-default configuration, so the vast majority of sites are unaffected. This problem is resolved in the latest version of the discourse-calendar plugin. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
References
▼ | URL | Tags |
---|---|---|
https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6 | x_refsource_CONFIRM | |
https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de | x_refsource_MISC | |
https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 97883109 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:44:43.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6" }, { "name": "https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de" }, { "name": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "discourse_calendar", "vendor": "discourse", "versions": [ { "lessThanOrEqual": "9d1726fe", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-43658", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T15:23:09.684587Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T15:48:22.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 97883109" } ] } ], "descriptions": [ { "lang": "en", "value": "dicourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Improper escaping of event titles could lead to Cross-site Scripting (XSS) within the \u0027email preview\u0027 UI when a site has CSP disabled. Having CSP disabled is a non-default configuration, so the vast majority of sites are unaffected. This problem is resolved in the latest version of the discourse-calendar plugin. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T21:28:57.341Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6" }, { "name": "https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de" }, { "name": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP", "tags": [ "x_refsource_MISC" ], "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP" } ], "source": { "advisory": "GHSA-3fwj-f6ww-7hr6", "discovery": "UNKNOWN" }, "title": "Improper escaping of user input in discourse-calendar" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-43658", "datePublished": "2023-10-16T21:28:57.341Z", "dateReserved": "2023-09-20T15:35:38.148Z", "dateUpdated": "2024-09-16T15:48:22.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21658
Vulnerability from cvelistv5
Published
2024-08-30 17:18
Modified
2024-08-30 18:00
Severity ?
EPSS score ?
Summary
discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.
References
▼ | URL | Tags |
---|---|---|
https://github.com/discourse/discourse-calendar/security/advisories/GHSA-65f2-9ghp-x8h8 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 66259cd21dc6a1b2139d9833f3f847d8013e6759 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21658", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-30T18:00:35.396698Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-30T18:00:51.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 66259cd21dc6a1b2139d9833f3f847d8013e6759" } ] } ], "descriptions": [ { "lang": "en", "value": "discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-30T17:18:40.593Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-65f2-9ghp-x8h8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-65f2-9ghp-x8h8" } ], "source": { "advisory": "GHSA-65f2-9ghp-x8h8", "discovery": "UNKNOWN" }, "title": "Insufficient control of region value length in discourse-calendar" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-21658", "datePublished": "2024-08-30T17:18:40.593Z", "dateReserved": "2023-12-29T16:10:20.367Z", "dateUpdated": "2024-08-30T18:00:51.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31059
Vulnerability from cvelistv5
Published
2022-06-14 19:55
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.
References
▼ | URL | Tags |
---|---|---|
https://github.com/discourse/discourse-calendar/security/advisories/GHSA-c783-x9vm-xxp5 | x_refsource_CONFIRM | |
https://github.com/discourse/discourse-calendar/pull/280 | x_refsource_MISC | |
https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 1.0.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-c783-x9vm-xxp5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/pull/280" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 1.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse\u2019s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-14T19:55:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-c783-x9vm-xxp5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/pull/280" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f" } ], "source": { "advisory": "GHSA-c783-x9vm-xxp5", "discovery": "UNKNOWN" }, "title": "Discourse Calendar Event names susceptible to Cross-site Scripting", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31059", "STATE": "PUBLIC", "TITLE": "Discourse Calendar Event names susceptible to Cross-site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "discourse-calendar", "version": { "version_data": [ { "version_value": "\u003c 1.0.1" } ] } } ] }, "vendor_name": "discourse" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse\u2019s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-c783-x9vm-xxp5", "refsource": "CONFIRM", "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-c783-x9vm-xxp5" }, { "name": "https://github.com/discourse/discourse-calendar/pull/280", "refsource": "MISC", "url": "https://github.com/discourse/discourse-calendar/pull/280" }, { "name": "https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f", "refsource": "MISC", "url": "https://github.com/discourse/discourse-calendar/commit/2719b9e81994e961bf8c4e12b4556dc9777dd62f" } ] }, "source": { "advisory": "GHSA-c783-x9vm-xxp5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31059", "datePublished": "2022-06-14T19:55:10", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45303
Vulnerability from cvelistv5
Published
2024-09-12 18:11
Modified
2024-09-12 19:55
Severity ?
EPSS score ?
Summary
Discourse Calendar plugin adds the ability to create a dynamic calendar in the first post of a topic to Discourse. Rendering event names can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse’s default Content Security Policy. The issue is patched in version 0.5 of the Discourse Calendar plugin.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 0.5 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45303", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-12T19:54:18.112389Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-12T19:55:25.980Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 0.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse Calendar plugin adds the ability to create a dynamic calendar in the first post of a topic to Discourse. Rendering event names can be susceptible to XSS attacks. This vulnerability only affects sites which have modified or disabled Discourse\u2019s default Content Security Policy. The issue is patched in version 0.5 of the Discourse Calendar plugin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-12T18:11:46.513Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-rq37-8pf3-4xc8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-rq37-8pf3-4xc8" }, { "name": "https://github.com/discourse/discourse-calendar/commit/81e1c8e3c4c02276fb890da7e3f684259aeb685c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/commit/81e1c8e3c4c02276fb890da7e3f684259aeb685c" } ], "source": { "advisory": "GHSA-rq37-8pf3-4xc8", "discovery": "UNKNOWN" }, "title": "Discourse Calendar plugin event names susceptible to XSS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45303", "datePublished": "2024-09-12T18:11:46.513Z", "dateReserved": "2024-08-26T18:25:35.443Z", "dateUpdated": "2024-09-12T19:55:25.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24817
Vulnerability from cvelistv5
Published
2024-02-22 17:45
Modified
2024-08-21 17:44
Severity ?
EPSS score ?
Summary
Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on the open-source discussion platform Discourse. Prior to version 0.4, event invitees created in topics in private categories or PMs (private messages) can be retrieved by anyone, even if they're not logged in. This problem is resolved in version 0.4 of the discourse-calendar plugin. While no known workaround is available, putting the site behind `login_required` will disallow this endpoint to be used by anonymous users, but logged in users can still get the list of invitees in the private topics.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:13.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f" }, { "name": "https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-24817", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T17:43:57.549224Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T17:44:07.251Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 0.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on the open-source discussion platform Discourse. Prior to version 0.4, event invitees created in topics in private categories or PMs (private messages) can be retrieved by anyone, even if they\u0027re not logged in. This problem is resolved in version 0.4 of the discourse-calendar plugin. While no known workaround is available, putting the site behind `login_required` will disallow this endpoint to be used by anonymous users, but logged in users can still get the list of invitees in the private topics." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-22T17:45:57.887Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f" }, { "name": "https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da" } ], "source": { "advisory": "GHSA-wwq5-g5cp-c69f", "discovery": "UNKNOWN" }, "title": "User can see invitees in events created in PMs and private categories" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24817", "datePublished": "2024-02-22T17:45:57.887Z", "dateReserved": "2024-01-31T16:28:17.942Z", "dateUpdated": "2024-08-21T17:44:07.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-26145
Vulnerability from cvelistv5
Published
2024-02-21 17:19
Modified
2024-08-27 15:08
Severity ?
EPSS score ?
Summary
Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on Discourse. Uninvited users are able to gain access to private events by crafting a request to update their attendance. This problem is resolved in commit dfc4fa15f340189f177a1d1ab2cc94ffed3c1190. As a workaround, one may use post visibility to limit access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: >= 2201b254, < dfc4fa15f340189f177a1d1ab2cc94ffed3c1190 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:59:32.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-4hh7-6m34-p2jp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-4hh7-6m34-p2jp" }, { "name": "https://github.com/discourse/discourse-calendar/commit/dfc4fa15f340189f177a1d1ab2cc94ffed3c1190", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/commit/dfc4fa15f340189f177a1d1ab2cc94ffed3c1190" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-26145", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T18:04:16.341838Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:08:13.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003e= 2201b254, \u003c dfc4fa15f340189f177a1d1ab2cc94ffed3c1190" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse Calendar adds the ability to create a dynamic calendar in the first post of a topic on Discourse. Uninvited users are able to gain access to private events by crafting a request to update their attendance. This problem is resolved in commit dfc4fa15f340189f177a1d1ab2cc94ffed3c1190. As a workaround, one may use post visibility to limit access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-21T17:19:11.128Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-4hh7-6m34-p2jp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-4hh7-6m34-p2jp" }, { "name": "https://github.com/discourse/discourse-calendar/commit/dfc4fa15f340189f177a1d1ab2cc94ffed3c1190", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse-calendar/commit/dfc4fa15f340189f177a1d1ab2cc94ffed3c1190" } ], "source": { "advisory": "GHSA-4hh7-6m34-p2jp", "discovery": "UNKNOWN" }, "title": "Uninvited user is able to join and mark the attendance of the the private event" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-26145", "datePublished": "2024-02-21T17:19:11.128Z", "dateReserved": "2024-02-14T17:40:03.689Z", "dateUpdated": "2024-08-27T15:08:13.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41913
Vulnerability from cvelistv5
Published
2022-11-14 00:00
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it's possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | discourse | discourse-calendar |
Version: < 0.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-jh96-w279-g7r9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/discourse/discourse-calendar/commit/ca5ae3e7e0c2b32af5ca4ec69c95e95b2ecef2e9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "discourse-calendar", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it\u0027s possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-jh96-w279-g7r9" }, { "url": "https://github.com/discourse/discourse-calendar/commit/ca5ae3e7e0c2b32af5ca4ec69c95e95b2ecef2e9" } ], "source": { "advisory": "GHSA-jh96-w279-g7r9", "discovery": "UNKNOWN" }, "title": "Discourse-calendar exposes members of hidden groups" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41913", "datePublished": "2022-11-14T00:00:00", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-08-03T12:56:38.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }