Discourse is a platform for community discussion. For fields that are client editable, limits on sizes are not imposed. This allows a malicious actor to cause a Discourse instance to use excessive disk space and also often excessive bandwidth. The issue is patched 3.1.4 and 3.2.0.beta4.
References
Link | Resource |
---|---|
https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Jan 2024, 15:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:discourse:discourse:3.2.0:beta3:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:* cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:* cpe:2.3:a:discourse:discourse:3.2.0:beta2:*:*:beta:*:*:* |
|
CWE | CWE-770 | |
References | () https://github.com/discourse/discourse/security/advisories/GHSA-m5fc-94mm-38fx - Vendor Advisory | |
First Time |
Discourse
Discourse discourse |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
12 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-12 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-21655
Mitre link : CVE-2024-21655
CVE.ORG link : CVE-2024-21655
JSON object : View
Products Affected
discourse
- discourse