cve/2023/CVE-2023-47119.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-47119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47119)
![](https://img.shields.io/static/v1?label=Product&message=discourse&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.1.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, some links can inject arbitrary HTML tags when rendered through our Onebox engine. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/BaadMaro/BaadMaro
- https://github.com/BaadMaro/CVE-2023-47119
2024-06-07 04:52:01 +00:00
- https://github.com/kip93/kip93
2024-05-25 21:48:12 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub