CVE-2022-36066
high-risk
Published 2022-09-29
Discourse is an open source discussion platform. In versions prior to 2.8.9 on the `stable` branch and prior to 2.9.0.beta10 on the `beta` and `tests-passed` branches, admins can upload a maliciously crafted Zip or Gzip Tar archive to write files at arbitrary locations and trigger remote code execution. The problem is patched in version 2.8.9 on the `stable` branch and version 2.9.0.beta10 on the `beta` and `tests-passed` branches. There are no known workarounds.
Do I need to act?
~
3.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/discourse/discourse/security/advisories/GHSA-grvh-qcpg-hfmv
Third Party Advisory
https://github.com/discourse/discourse/security/advisories/GHSA-grvh-qcpg-hfmv
54
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
7/34 · Low
Exposure
16/34 · Moderate