Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://github.com/discourse/discourse/commit/bfc3132bb22bd5b7e86f428746b89c4d3d7f5a70 - Patch | |
References | () https://github.com/discourse/discourse/security/advisories/GHSA-ff7g-xv79-hgmf - Vendor Advisory |
Information
Published : 2023-07-28 16:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38684
Mitre link : CVE-2023-38684
CVE.ORG link : CVE-2023-38684
JSON object : View
Products Affected
discourse
- discourse
CWE
CWE-770
Allocation of Resources Without Limits or Throttling