Possible Server-Side Request Forgery (SSRF) in webhooks
CVE-2022-39241

7.6HIGH

Key Information:

Vendor
Discourse
Status
Vendor
CVE Published:
2 November 2022

Summary

Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest stable, beta, and test-passed versions are now patched. As a workaround, self-hosters can use DISCOURSE_BLOCKED_IP_BLOCKS env var (which overrides blocked_ip_blocks setting) to stop webhooks from accessing private IPs.

Affected Version(s)

discourse <= 2.8.9 <= 2.8.9

discourse <= 2.9.0.beta10 <= 2.9.0.beta10

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.