Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity High
Privileges Required High
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact None
User Interaction Required
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Discourse |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-01-05T19:48:05.483Z
Updated: 2024-08-03T14:24:03.295Z
Reserved: 2022-11-28T17:27:19.999Z
Link: CVE-2022-46177
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-01-05T20:15:18.587
Modified: 2024-11-21T07:30:16.043
Link: CVE-2022-46177
Redhat
No data.