cve-2022-46168
Vulnerability from cvelistv5
Published
2023-01-05 17:18
Modified
2024-08-03 14:24
Severity ?
EPSS score ?
Summary
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another's email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-staged users masks those emails with blind carbon copy (BCC). Staged users are ones that have likely only interacted with the group via email, and will likely include other people who were CC'd on the original email to the group. As a workaround, disable group SMTP for any groups that have it enabled.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/discourse/discourse/pull/19724 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/discourse/discourse/pull/19724 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm | Third Party Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm" }, { "name": "https://github.com/discourse/discourse/pull/19724", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/discourse/discourse/pull/19724" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "discourse", "vendor": "discourse", "versions": [ { "status": "affected", "version": "\u003c 2.8.14" }, { "status": "affected", "version": "\u003e= 2.9.0.beta0, \u003c 2.9.0.beta15" } ] } ], "descriptions": [ { "lang": "en", "value": "Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another\u0027s email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-staged users masks those emails with blind carbon copy (BCC). Staged users are ones that have likely only interacted with the group via email, and will likely include other people who were CC\u0027d on the original email to the group. As a workaround, disable group SMTP for any groups that have it enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-359", "description": "CWE-359: Exposure of Private Personal Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-05T17:18:58.143Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm" }, { "name": "https://github.com/discourse/discourse/pull/19724", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/discourse/discourse/pull/19724" } ], "source": { "advisory": "GHSA-8p7g-3wm6-p3rm", "discovery": "UNKNOWN" }, "title": "Group SMTP user emails are exposed in CC email header" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-46168", "datePublished": "2023-01-05T17:18:58.143Z", "dateReserved": "2022-11-28T17:27:19.998Z", "dateUpdated": "2024-08-03T14:24:03.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-46168\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-01-05T18:15:08.950\",\"lastModified\":\"2024-11-21T07:30:14.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another\u0027s email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-staged users masks those emails with blind carbon copy (BCC). Staged users are ones that have likely only interacted with the group via email, and will likely include other people who were CC\u0027d on the original email to the group. As a workaround, disable group SMTP for any groups that have it enabled.\"},{\"lang\":\"es\",\"value\":\"Discourse es una plataforma de discusi\u00f3n de fuentes de opciones. Antes de la versi\u00f3n 2.8.14 en la rama \\\"estable\\\" y la versi\u00f3n 2.9.0.beta15 en las ramas \\\"beta\\\" y \\\"pruebas aprobadas\\\", los destinatarios de un correo electr\u00f3nico SMTP grupal pod\u00edan ver las direcciones de correo electr\u00f3nico de todos los dem\u00e1s usuarios dentro del grupo. Tema SMTP. La mayor\u00eda de las veces esto no es un problema ya que probablemente ya est\u00e9n familiarizados con las direcciones de correo electr\u00f3nico de los dem\u00e1s. Este problema se solucion\u00f3 en las versiones 2.8.14 y 2.9.0.beta15. La soluci\u00f3n es que alguien que env\u00eda correos electr\u00f3nicos a trav\u00e9s de SMTP grupal a usuarios no preparados enmascara esos correos electr\u00f3nicos con copia oculta (blind carbon copy, BCC). Los usuarios preparados son aquellos que probablemente solo han interactuado con el grupo a trav\u00e9s de correo electr\u00f3nico y probablemente incluir\u00e1n a otras personas que recibieron CC en el correo electr\u00f3nico original del grupo. Como workaround, deshabilite el SMTP de grupo para cualquier grupo que lo tenga habilitado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-359\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.8.14\",\"matchCriteriaId\":\"9C13BCBA-EF34-4F4B-9F4A-33392EB45196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3803EF9-A296-42B7-887F-93C5E68E94C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BAC488-3622-4B0B-B8EA-879E8C68E8CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"406A23B4-B971-4DC8-A132-EE9854FE8546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD3C47F-E49F-4E19-9EA7-A322C4CFD541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:*:*:*:*\",\"matchCriteriaId\":\"E924AC08-6978-4DFF-B616-9E3E9D6FBE1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A3C7FB-B3B6-45F0-AD7D-062A50490AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA3D313-3C11-43E2-A47D-CBB532D1B6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F42673E-65F3-4807-9484-20CB747420FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B91D023-FCE5-4866-AD8B-BBB675763104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"0086484D-0164-449C-8AAE-BE7479CB9706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D1B031-96C7-44C0-A0A0-F67ABE55C93C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"750D2AD9-35E7-4AC7-9C22-AA90DAA34F3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"B68E308A-BDAB-4614-A563-4460F7996CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"F62275F8-11E9-4D94-8F2E-F83905F65031\"}]}]}],\"references\":[{\"url\":\"https://github.com/discourse/discourse/pull/19724\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/pull/19724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.