侵犯隐私
CVE编号
CVE-2022-46168利用情况
暂无补丁情况
N/A披露时间
2023-01-06漏洞描述
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another's email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-staged users masks those emails with blind carbon copy (BCC). Staged users are ones that have likely only interacted with the group via email, and will likely include other people who were CC'd on the original email to the group. As a workaround, disable group SMTP for any groups that have it enabled.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/discourse/discourse/pull/19724 | |
https://github.com/discourse/discourse/security/advisories/GHSA-8p7g-3wm6-p3rm |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | discourse | discourse | * | Up to (excluding) 2.8.14 | |||||
运行在以下环境 | |||||||||
应用 | discourse | discourse | 2.9.0 | - | |||||
运行在以下环境 | |||||||||
应用 | discourse | discourse | 3.0.0 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 低
- 影响范围 未更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-359 | 侵犯隐私 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论