Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-2vjv-pgh4-6rmq | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-07 21:15
Updated : 2024-10-19 01:11
NVD link : CVE-2024-45051
Mitre link : CVE-2024-45051
CVE.ORG link : CVE-2024-45051
JSON object : View
Products Affected
discourse
- discourse
CWE