cve-2022-21677
Vulnerability from cvelistv5
Published
2022-01-14 16:45
Modified
2024-08-03 02:46
Summary
Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group's visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:46:39.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "discourse",
          "vendor": "discourse",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.7.13"
            },
            {
              "status": "affected",
              "version": "\u003c 2.8.0.beta11"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group\u0027s members visibility set to public as well. However, a group\u0027s visibility and the group\u0027s members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group\u0027s visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-14T16:45:17",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44"
        }
      ],
      "source": {
        "advisory": "GHSA-768r-ppv4-5r27",
        "discovery": "UNKNOWN"
      },
      "title": "Group advanced search option may leak group and group\u0027s members visibility ",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2022-21677",
          "STATE": "PUBLIC",
          "TITLE": "Group advanced search option may leak group and group\u0027s members visibility "
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "discourse",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 2.7.13"
                          },
                          {
                            "version_value": "\u003c 2.8.0.beta11"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "discourse"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group\u0027s members visibility set to public as well. However, a group\u0027s visibility and the group\u0027s members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group\u0027s visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27",
              "refsource": "CONFIRM",
              "url": "https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27"
            },
            {
              "name": "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44",
              "refsource": "MISC",
              "url": "https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-768r-ppv4-5r27",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2022-21677",
    "datePublished": "2022-01-14T16:45:17",
    "dateReserved": "2021-11-16T00:00:00",
    "dateUpdated": "2024-08-03T02:46:39.325Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-21677\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-14T17:15:13.153\",\"lastModified\":\"2024-11-21T06:45:12.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group\u0027s members visibility set to public as well. However, a group\u0027s visibility and the group\u0027s members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A vulnerability has been discovered in versions prior to 2.7.13 and 2.8.0.beta11 where the group advanced search option does not respect the group\u0027s visibility and members visibility level. As such, a group with restricted visibility or members visibility can be revealed through search with the right search option. This issue is patched in `stable` version 2.7.13, `beta` version 2.8.0.beta11, and `tests-passed` version 2.8.0.beta11 versions of Discourse. There are no workarounds aside from upgrading.\"},{\"lang\":\"es\",\"value\":\"Discourse es una plataforma de discusi\u00f3n de c\u00f3digo abierto. Los grupos de Discourse pueden ser configurados con diferentes niveles de visibilidad para el grupo as\u00ed como para los miembros del grupo. Por defecto, un grupo reci\u00e9n creado presenta su visibilidad establecida como p\u00fablica y la de los miembros del grupo tambi\u00e9n. Sin embargo, la visibilidad de un grupo y la de sus miembros puede configurarse de forma que restrinja a usuarios conectados, a los miembros del grupo o a usuarios del personal. Se ha detectado una vulnerabilidad en las versiones anteriores a la 2.7.13 y 2.8.0.beta11 en la que la opci\u00f3n de b\u00fasqueda avanzada de grupos no respeta el nivel de visibilidad del grupo y de los miembros. De este modo, un grupo con visibilidad restringida o con visibilidad de miembros puede ser revelado mediante una b\u00fasqueda con la opci\u00f3n de b\u00fasqueda correcta. Este problema est\u00e1 parcheado en las versiones \\\"stable\\\" 2.7.13, \\\"beta\\\" 2.8.0.beta11 y \\\"tests-passed\\\" 2.8.0.beta11 de Discourse. No se presentan medidas de mitigaci\u00f3n adicionales aparte de la actualizaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.12\",\"matchCriteriaId\":\"90644EF6-8581-4711-A415-1886D3199768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7F8AC4-35D1-45E5-8A3A-B0205000A5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A24507D-6D4B-4992-BCFE-232AF3BFCC30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9AE12FE-0396-4843-8D30-D8C44FAE01DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F101AEAB-4FB7-4BE3-931B-595702D616C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6878B7F-2691-4D3F-8116-CB282FDAAAC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EABAB9-BEA4-48D4-ADBA-D00746B29C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A255A2-4658-41AD-A4DE-A7F8D018028D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5804585-2EA4-4677-8EC1-5F561D5C7D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"082A6871-080A-4AA7-AF4A-D664EA46488A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A280205-A2DC-4E30-937B-5564C779FD5A\"}]}]}],\"references\":[{\"url\":\"https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/commit/fff8b98485561b12d070c0a8c39f4e503813ab44\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.