NA

CVE-2023-47119

Published: 10/11/2023 Updated: 16/11/2023
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.

Vulnerable Product Search on Vulmon Subscribe to Product

discourse discourse 3.2.0

discourse discourse

Github Repositories

A POC for CVE-2023-47119

Table of contents CVE-2023-47119 Detailed analysis POC Escalation ? LAB Setup CVE-2023-47119 A POC for CVE-2023-47119 which is a vulnerability affecting Discourse versions prior to version 313 of the stable branch and version 320beta3 of the beta and tests-passed branches Some links can inject arbitrary HTML tags when rendered through the Onebox engine Detai

Hi there πŸ‘‹ πŸ“ Latest blog posts Blog : baadmarogithubio/ Discourse CVE-2023-47119 - Building a CVE POC from commits changes Bypass captcha using OCR on Dolibarr login page Android Applications Pentesting, Intentional Exercise from Hackerone platform IoT Pentesting with Teltonika RUT9XX