Discourse CVE-2022-46177 allows attackers to takeover users' accounts by exploiting the password reset mechanism. Upgrade to patched versions 2.8.14 or 3.0.0.beta15 to secure your accounts.
Discourse password reset link can lead to an account takeover if the user changes to a new email.
Understanding CVE-2022-46177
This CVE affects Discourse, an open-source discussion platform, where a vulnerability existed prior to version 2.8.14 on the
stable
branch and version 3.0.0.beta16 on the beta
and tests-passed
branches.
What is CVE-2022-46177?
CVE-2022-46177 is a vulnerability in Discourse that allows an attacker to take over a user account by exploiting the password reset mechanism. When a user requests a password reset link email, changes their primary email, and then uses the old reset email, the account's primary email can be re-linked to the old email, leading to an account takeover.
The Impact of CVE-2022-46177
The impact of this vulnerability is high, with confidentiality and integrity impacts rated as high. It requires high privileges to exploit and user interaction is required. However, the availability impact is none.
Technical Details of CVE-2022-46177
This CVE has a CVSSv3.1 base score of 5.7, indicating a medium severity vulnerability with high attack complexity and the need for user interaction.
Vulnerability Description
The vulnerability arises from insufficient session expiration, allowing the reuse of old password reset links after a primary email change.
Affected Systems and Versions
Users of Discourse versions prior to 2.8.14 and 3.0.0.beta16 are affected by this vulnerability.
Exploitation Mechanism
By exploiting the password reset link email and changing the primary email, an attacker can take over the user's account.
Mitigation and Prevention
It is crucial for users to take immediate steps to prevent exploitation and ensure long-term security practices.
Immediate Steps to Take
Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch for this vulnerability. Additionally, they can lower the
email_token_valid_hours
as a temporary workaround.
Long-Term Security Practices
Implement strong password policies, utilize 2-factor authentication, and regularly update the Discourse platform to the latest versions.
Patching and Updates
Stay informed about security updates and promptly apply patches released by Discourse to mitigate any potential risks.