Vulnerability Details : CVE-2022-39279
discourse-chat is a plugin for the Discourse message board which adds chat functionality. In versions prior to 0.9 some places render a chat channel's name and description in an unsafe way, allowing staff members to cause an cross site scripting (XSS) attack by inserting unsafe HTML into them. Version 0.9 has addressed this issue. Users are advised to upgrade. There are no known workarounds for this issue.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2022-39279
- cpe:2.3:a:discourse:discourse-chat:*:*:*:*:*:discourse:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39279
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39279
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L |
0.9
|
3.4
|
GitHub, Inc. |
CWE ids for CVE-2022-39279
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-39279
-
https://github.com/discourse/discourse-chat/commit/25737733af48e5b9fa60b0561d7fde14bea13cce
SECURITY: Ensure channel name and description are always escaped. (#1… · discourse/discourse-chat@2573773 · GitHubPatch;Third Party Advisory
-
https://github.com/discourse/discourse-chat/security/advisories/GHSA-qp62-8m3c-9jgj
Channel name and description susceptible to XSS · Advisory · discourse/discourse-chat · GitHubThird Party Advisory
Jump to