CVE-2022-46177

Discourse password reset link can lead to in account takeover if user changes to a new email

Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.


We have discovered 1,134 live websites that are affected by CVE-2022-46177.

Contact us to get more info




Affected Software

Product  Discourse
Category Message Boards
Vulnerable Domains1,134 live websites (21.71% of Discourse install base)
Vulnerable Versions
  • from 0 before 2.8.14
  • from 2.9 before 3
Vulnerable Versions Count70 versions ( 73.68% of all versions)


Common Weakness Enumeration

CWE-613 Insufficient Session Expiration



Details

  • Published - Jan 5, 2023
  • Updated - Aug 3, 2024

CVE-2022-46177 usage by Country

United States786 websites



Germany89 websites
France49 websites
Singapore35 websites
China26 websites
GB17 websites
Brazil11 websites
Netherlands11 websites
Switzerland10 websites

CVE-2022-46177 usage by TLD

.com481 websites
.org184 websites
.io57 websites
.net50 websites
.de25 websites
.co14 websites
.fr14 websites
.ru10 websites
.com.br10 websites
.cn9 websites

Vulnerable Versions

Vulnerable versions are highlighted in red

Websites affected by CVE-2022-46177

Top websites that are affected by CVE-2022-46177. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
*********.***.com France*,***
*********.*******.org United States**,***
******.********.com United States**,***
*********.***************.com United States**,***
*********.**********.de Germany***,***
*********.**********.io United States***,***
*****.******.com United States***,***
***********.net United States***,***
*********.****.ly United States***,***
*************.de United States***,***
See full domain list

FAQ

CVE-2022-46177 is Insufficient Session Expiration in Discourse
A total of 1,134 websites have been identified as vulnerable to CVE-2022-46177, discovered through global website indexing conducted by WebTechSurvey.
Discourse is susceptible to CVE-2022-46177 vulnerability.
Discourse versions before 3 are vulnerable to CVE-2022-46177.
Version 3 of Discourse addresses the CVE-2022-46177 security vulnerability.