CVE-2022-21677
Vulnerability from cvelistv5
Published
2022-01-14 16:45
Modified
2025-04-23 19:12
Severity ?
EPSS score ?
Summary
Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.
References
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:46:39.325Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-21677", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-23T14:12:15.571887Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-23T19:12:05.254Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "discourse", vendor: "discourse", versions: [ { status: "affected", version: "< 2.7.13", }, { status: "affected", version: "< 2.8.0.beta11", }, ], }, ], descriptions: [ { lang: "en", value: "Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-01-14T16:45:17.000Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44", }, ], source: { advisory: "GHSA-768r-ppv4-5r27", discovery: "UNKNOWN", }, title: "Group advanced search option may leak group and group's members visibility ", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-21677", STATE: "PUBLIC", TITLE: "Group advanced search option may leak group and group's members visibility ", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "discourse", version: { version_data: [ { version_value: "< 2.7.13", }, { version_value: "< 2.8.0.beta11", }, ], }, }, ], }, vendor_name: "discourse", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27", refsource: "CONFIRM", url: "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27", }, { name: "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44", refsource: "MISC", url: "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44", }, ], }, source: { advisory: "GHSA-768r-ppv4-5r27", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-21677", datePublished: "2022-01-14T16:45:17.000Z", dateReserved: "2021-11-16T00:00:00.000Z", dateUpdated: "2025-04-23T19:12:05.254Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-21677\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-14T17:15:13.153\",\"lastModified\":\"2024-11-21T06:45:12.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.\"},{\"lang\":\"es\",\"value\":\"Discourse es una plataforma de discusión de código abierto. Los grupos de Discourse pueden ser configurados con diferentes niveles de visibilidad para el grupo así como para los miembros del grupo. Por defecto, un grupo recién creado presenta su visibilidad establecida como pública y la de los miembros del grupo también. Sin embargo, la visibilidad de un grupo y la de sus miembros puede configurarse de forma que restrinja a usuarios conectados, a los miembros del grupo o a usuarios del personal. Se ha detectado una vulnerabilidad en las versiones anteriores a la 2.7.13 y 2.8.0.beta11 en la que la opción de búsqueda avanzada de grupos no respeta el nivel de visibilidad del grupo y de los miembros. De este modo, un grupo con visibilidad restringida o con visibilidad de miembros puede ser revelado mediante una búsqueda con la opción de búsqueda correcta. Este problema está parcheado en las versiones \\\"stable\\\" 2.7.13, \\\"beta\\\" 2.8.0.beta11 y \\\"tests-passed\\\" 2.8.0.beta11 de Discourse. No se presentan medidas de mitigación adicionales aparte de la actualización\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.12\",\"matchCriteriaId\":\"90644EF6-8581-4711-A415-1886D3199768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7F8AC4-35D1-45E5-8A3A-B0205000A5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A24507D-6D4B-4992-BCFE-232AF3BFCC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9AE12FE-0396-4843-8D30-D8C44FAE01DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F101AEAB-4FB7-4BE3-931B-595702D616C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6878B7F-2691-4D3F-8116-CB282FDAAAC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EABAB9-BEA4-48D4-ADBA-D00746B29C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A255A2-4658-41AD-A4DE-A7F8D018028D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5804585-2EA4-4677-8EC1-5F561D5C7D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"082A6871-080A-4AA7-AF4A-D664EA46488A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A280205-A2DC-4E30-937B-5564C779FD5A\"}]}]}],\"references\":[{\"url\":\"https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.