Discourse is an open source platform for community discussion. Without a rate limit on the POST /uploads endpoint, it makes it easier for an attacker to carry out a DoS attack on the server since creating an upload can be a resource intensive process. Do note that the impact varies from site to site as various site settings like `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` will determine the amount of resources used when creating an upload. The issue is patched in the latest stable, beta and tests-passed version of Discourse. Users are advised to upgrade. Users unable to upgrade should reduce `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` as smaller uploads require less resources to process. Alternatively, `client_max_body_size` can be reduced in Nginx to prevent large uploads from reaching the server.
References
Configurations
No configuration.
History
21 Nov 2024, 08:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/discourse/discourse/commit/003b80e62f97cd8c0114d6b9d3f93c10443e6fae - | |
References | () https://github.com/discourse/discourse/security/advisories/GHSA-58vw-246g-fjj4 - |
15 Mar 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-15 20:15
Updated : 2024-11-21 08:59
NVD link : CVE-2024-24827
Mitre link : CVE-2024-24827
CVE.ORG link : CVE-2024-24827
JSON object : View
Products Affected
No product.
CWE
CWE-400
Uncontrolled Resource Consumption