HTMLi(XSS without CSP) via Onebox urls
Package
Discourse
(Discourse)
Affected versions
stable <= 3.3.3; beta <= 3.4.0.beta3; tests-passed <= 3.4.0.beta3
Patched versions
stable >= 3.3.4; beta >= 3.4.0.beta4; tests-passed >= 3.4.0.beta4
Impact
An attacker can execute arbitrary JavaScript on users' browsers by posting a maliciously crafted onebox url. This issue only affects sites with CSP disabled.
Patches
This problem is patched in the latest version of Discourse.
Workarounds
Enable CSP, Disable inline Oneboxes globally, or allow specific domains for Oneboxing.
References