Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared hosting environments where admins are untrusted. This issue has been addressed in versions 3.0.3 and 3.1.0.beta4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-vm65-pv5h-6g3w | Vendor Advisory |
https://github.com/discourse/discourse/security/advisories/GHSA-vm65-pv5h-6g3w | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/discourse/discourse/security/advisories/GHSA-vm65-pv5h-6g3w - Vendor Advisory |
Information
Published : 2023-04-18 21:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28440
Mitre link : CVE-2023-28440
CVE.ORG link : CVE-2023-28440
JSON object : View
Products Affected
discourse
- discourse
CWE