Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-38706
HistorySep 15, 2023 - 7:22 p.m.

CVE-2023-38706 Discourse vulnerable to DoS via drafts

2023-09-1519:22:08
CWE-770
GitHub_M
www.cve.org
5
discourse platform
dos vulnerability
version 3.1.1
version 3.2.0.beta1
malicious user
resource exhaustion

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.0%

Discourse is an open-source discussion platform. Prior to version 3.1.1 of the stable branch and version 3.2.0.beta1 of the beta and tests-passed branches, a malicious user can create an unlimited number of drafts with very long draft keys which may end up exhausting the resources on the server. The issue is patched in version 3.1.1 of the stable branch and version 3.2.0.beta1 of the beta and tests-passed branches. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "discourse",
    "product": "discourse",
    "versions": [
      {
        "version": "stable < 3.1.1",
        "status": "affected"
      },
      {
        "version": "beta < 3.2.0.beta1",
        "status": "affected"
      },
      {
        "version": "tests-passed < 3.2.0.beta1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.0%

Related for CVELIST:CVE-2023-38706