CVE-2022-39355

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-39355
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39355.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-39355
Aliases
  • GHSA-fvj9-f67v-qpr4
Published
2022-10-26T00:00:00Z
Modified
2025-12-04T10:36:04.588795Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Discourse Patreon vulnerable to improper validation of email during Patreon authentication
Details

Discourse Patreon enables syncronization between Discourse Groups and Patreon rewards. On sites with Patreon login enabled, an improper authentication vulnerability could be used to take control of a victim's forum account. This vulnerability is patched in commit number 846d012151514b35ce42a1636c7d70f6dcee879e of the discourse-patreon plugin. Out of an abundance of caution, any Discourse accounts which have logged in with an unverified-email Patreon account will be logged out and asked to verify their email address on their next login. As a workaround, disable the patreon integration and log out all users with associated Patreon accounts.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-287"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39355.json"
}
References

Affected packages

Git / github.com/discourse/discourse-patreon

Affected ranges

Type
GIT
Repo
https://github.com/discourse/discourse-patreon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed