Possible Server-Side Request Forgery (SSRF) in webhooks
CVE-2022-39241
7.6HIGH
Summary
Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest stable
, beta
, and test-passed
versions are now patched. As a workaround, self-hosters can use DISCOURSE_BLOCKED_IP_BLOCKS
env var (which overrides blocked_ip_blocks
setting) to stop webhooks from accessing private IPs.
Affected Version(s)
discourse <= 2.8.9 <= 2.8.9
discourse <= 2.9.0.beta10 <= 2.9.0.beta10
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved