In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Mesh3l911/Disource | Third Party Advisory |
https://github.com/discourse/discourse/releases | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Jan 2022, 16:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/162256/Discourse-2.7.0-2FA-Bypass.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2021-01-14 04:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-3138
Mitre link : CVE-2021-3138
CVE.ORG link : CVE-2021-3138
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts