Discourse password reset link can lead to in account takeover if user changes to a new email
Description
Discourse is an option source discussion platform. Prior to version 2.8.14 on the stable branch and version 3.0.0.beta16 on the beta and tests-passed branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting email_token_valid_hours which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower email_token_valid_hours as needed.
Affected products
1- Range: < 2.8.14
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/discourse/discourse/commit/4bf306f0e3bf54a9ef9c5886bf1cfb85c20da570mitrex_refsource_MISC
- github.com/discourse/discourse/commit/83944213b2b2454af80d0407f60d67641b1f0b38mitrex_refsource_MISC
- github.com/discourse/discourse/security/advisories/GHSA-5www-jxvf-vrc3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.