Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/commit/a34075d205a8857e29574ffd82aaece0c467565e | Patch Third Party Advisory |
https://github.com/discourse/discourse/pull/15927 | Patch Third Party Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-22xw-f62v-cfxv | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-02-15 21:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-23641
Mitre link : CVE-2022-23641
CVE.ORG link : CVE-2022-23641
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')