Skip to content

CSP nonce reuse vulnerability for anonymous users

Moderate
jomaxro published GHSA-gr5h-hm62-jr3j Jul 28, 2023

Package

Discourse (Discourse)

Affected versions

beta <= 3.1.0.beta6; tests-passed <= 3.1.0.beta6

Patched versions

beta >= 3.1.0.beta7; tests-passed >= 3.1.0.beta7

Description

Impact

A CSP (Content Security Policy) nonce reuse vulnerability was discovered could allow XSS attacks to bypass CSP protection for anonymous (i.e. unauthenticated) users. There are no known XSS vectors at the moment, but should one be discovered, this vulnerability would allow the XSS attack to bypass CSP and execute successfully. This vulnerability isn't applicable to logged-in users.

Patches

The vulnerability is patched in the latest tests-passed and beta branches. The stable branch doesn't have this vulnerability .

Workarounds

A workaround to prevent the vulnerability is to disable Google Tag Manager, i.e., unset the gtm container id setting.

Severity

Moderate
6.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

CVE ID

CVE-2023-37467

Weaknesses

No CWEs

Credits