Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | () https://github.com/discourse/discourse/commit/39c2f63b35d90ebaf67b9604cf1d424e5984203c - Patch | |
References | () https://github.com/discourse/discourse/pull/20710 - Patch | |
References | () https://github.com/discourse/discourse/security/advisories/GHSA-9897-x229-55gh - Vendor Advisory |
Information
Published : 2023-03-17 19:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28112
Mitre link : CVE-2023-28112
CVE.ORG link : CVE-2023-28112
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-918
Server-Side Request Forgery (SSRF)