CVE Vulnerabilities

CVE-2021-37693

Insufficient Session Expiration

Published: Aug 13, 2021 | Modified: Aug 30, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

Discourse is an open-source platform for community discussion. In Discourse before versions 2.7.8 and 2.8.0.beta4, when adding additional email addresses to an existing account on a Discourse site an email token is generated as part of the email verification process. Deleting the additional email address does not invalidate an unused token which can then be used in other contexts, including reseting a password.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Discourse Discourse * 2.7.8 (excluding)
Discourse Discourse 2.8.0-beta1 (including) 2.8.0-beta1 (including)
Discourse Discourse 2.8.0-beta2 (including) 2.8.0-beta2 (including)
Discourse Discourse 2.8.0-beta3 (including) 2.8.0-beta3 (including)

Potential Mitigations

References